First published: Mon Mar 05 2018(Updated: )
The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/graphicsmagick | 1.4+really1.3.35-1~deb10u2 1.4+really1.3.35-1~deb10u3 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.42-1 | |
Graphicsmagick Graphicsmagick | =1.3.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-18220.
The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 are affected.
The vulnerability may allow remote attackers to cause a denial of service or possibly have unspecified other impact.
To fix this vulnerability, update GraphicsMagick to version 1.4+really1.3.35-1~deb10u2 or later.
You can find more information about this vulnerability in the references provided: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f, http://www.securityfocus.com/bid/103276, https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html.