First published: Tue Dec 26 2017(Updated: )
In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buffer over-read in ReadMNGImage in coders/png.c, related to accessing one byte before testing whether a limit has been reached.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.27 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17915 is a vulnerability in GraphicsMagick 1.4 snapshot-20171217 Q8 that allows a heap-based buffer over-read.
CVE-2017-17915 has a severity score of 8.8, indicating a high severity.
CVE-2017-17915 affects GraphicsMagick 1.4 snapshot-20171217 Q8 and can lead to a heap-based buffer over-read in ReadMNGImage in coders/png.c.
To fix CVE-2017-17915, update your GraphicsMagick installation to version 1.3.27-3 or later.
You can find more information about CVE-2017-17915 at the following references: [CVE-2017-17915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915), [GraphicsMagick commit](http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/1721f1b7e67a), [GraphicsMagick bug report](https://sourceforge.net/p/graphicsmagick/bugs/535/).