First published: Wed Dec 20 2017(Updated: )
In GraphicsMagick 1.3.27a, there is a heap-based buffer over-read in ReadOneJNGImage in coders/png.c, related to oFFs chunk allocation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.27a | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-17782.
The severity of CVE-2017-17782 is high (8.8).
GraphicsMagick versions 1.3.18-1ubuntu3.1+ and 1.3.23-1ubuntu0.5 are affected by CVE-2017-17782.
To fix CVE-2017-17782 in GraphicsMagick, update to version 1.3.18-1ubuntu3.1+ for Ubuntu or version 1.3.23-1ubuntu0.5 for Xenial.
You can find more information about CVE-2017-17782 at the following references: [Link1](http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=8e3d2264109c), [Link2](https://sourceforge.net/p/graphicsmagick/bugs/530/), [Link3](https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html).