First published: Wed Mar 14 2018(Updated: )
An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadEnhMetaFile in coders/emf.c, which allows attackers to cause a denial of service via a crafted file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18231 is a vulnerability in GraphicsMagick 1.3.26 that allows attackers to cause a denial of service via a crafted file.
The severity of CVE-2017-18231 is medium with a CVSS score of 6.5.
To check if your system is affected by CVE-2017-18231, check the version of GraphicsMagick installed on your system. If the version is 1.3.26, your system is vulnerable.
To fix CVE-2017-18231, update GraphicsMagick to version 1.4+really1.3.35-1~deb10u2 or later.
You can find more information about CVE-2017-18231 at the following references: [MITRE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231), [GraphicsMagick](http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/ea074081678b), [SourceForge](https://sourceforge.net/p/graphicsmagick/bugs/475/).