First published: Mon Apr 08 2019(Updated: )
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | <=1.3.31 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Debian Debian Linux | =8.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-11009.
The severity of CVE-2019-11009 is high.
Versions 1.4+really1.3.35-1~deb10u2, 1.4+really1.3.35-1~deb10u3, 1.4+really1.3.36+hg16481-2+deb11u1, 1.4+really1.3.40-4, 1.4+really1.3.42-1 of GraphicsMagick, and version 1.3.28-2ubuntu0.1 of graphicsmagick in Ubuntu 18.04 LTS (Bionic Beaver) are affected by CVE-2019-11009.
Attackers can exploit CVE-2019-11009 by using a crafted image file to cause a denial of service or information disclosure.
To mitigate the vulnerability CVE-2019-11009, update GraphicsMagick to version 1.4+really1.3.35-1~deb10u2, 1.4+really1.3.35-1~deb10u3, 1.4+really1.3.36+hg16481-2+deb11u1, 1.4+really1.3.40-4, or 1.4+really1.3.42-1, and update graphicsmagick in Ubuntu 18.04 LTS (Bionic Beaver) to version 1.3.28-2ubuntu0.1.