First published: Wed Mar 14 2018(Updated: )
An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of service via a crafted file, because file size is not properly used to restrict scanline, strip, and tile allocations.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-18229.
The severity of CVE-2017-18229 is medium with a CVSS score of 6.5.
GraphicsMagick 1.3.26 is affected by CVE-2017-18229.
An attacker can exploit CVE-2017-18229 by using a crafted file to cause a denial of service.
To fix CVE-2017-18229, upgrade to GraphicsMagick version 1.4+really1.3.42-1 or apply the necessary patches.