First published: Wed Jun 26 2019(Updated: )
A vulnerability was found in ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c. Reference: <a href="https://github.com/ImageMagick/ImageMagick/issues/1520">https://github.com/ImageMagick/ImageMagick/issues/1520</a> Upstream fix: <a href="https://github.com/ImageMagick/ImageMagick6/commit/ff840181f631b1b7f29160cae24d792fcd176bae">https://github.com/ImageMagick/ImageMagick6/commit/ff840181f631b1b7f29160cae24d792fcd176bae</a> <a href="https://github.com/ImageMagick/ImageMagick/commit/c0fe488e7052f68d4eb7768805a857ef6fef928d">https://github.com/ImageMagick/ImageMagick/commit/c0fe488e7052f68d4eb7768805a857ef6fef928d</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.8-34 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
redhat/ImageMagick 7.0.8 | <35 | 35 |
redhat/ImageMagick 6.9.10 | <35 | 35 |
IBM Data Risk Manager | <=2.0.6 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12976 is a vulnerability in ImageMagick that allows a remote attacker to cause a denial of service condition by exploiting a memory leak in the ReadPCLImage function in coders/pcl.c.
CVE-2019-12976 has a severity rating of 5.5 (medium).
To fix CVE-2019-12976, apply the recommended patches or updates provided by the vendor or software maintainer.
The affected software versions include ImageMagick 7.0.8-34 and certain versions of Ubuntu, Debian, Canonical Ubuntu Linux, openSUSE Leap, and IBM Data Risk Manager.
More information about CVE-2019-12976 can be found in the references provided: [Link 1], [Link 2], [Link 3]