First published: Wed Oct 04 2017(Updated: )
GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2017-14997 is a denial of service (excessive memory allocation) vulnerability in GraphicsMagick 1.3.26.
The vulnerability CVE-2017-14997 allows remote attackers to cause a denial of service by exploiting an integer underflow in ReadPICTImage in coders/pict.c.
The severity of vulnerability CVE-2017-14997 is high with a CVSS score of 6.5.
GraphicsMagick version 1.3.26 is affected by vulnerability CVE-2017-14997.
To fix vulnerability CVE-2017-14997 in GraphicsMagick, you should update to a patched version of the software.