First published: Fri Jul 05 2019(Updated: )
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.8-50-q16 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
redhat/ImageMagick 6.9.10 | <50 | 50 |
redhat/ImageMagick 7.0.8 | <50 | 50 |
IBM Data Risk Manager | <=2.0.6 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13295 is a vulnerability in ImageMagick that allows a local attacker to execute arbitrary code or cause a crash by causing a heap-based buffer overflow.
The severity of CVE-2019-13295 is high, with a CVSS score of 8.8.
ImageMagick versions 7.0.8-50 Q16, ImageMagick 6.9.10, and IBM Data Risk Manager version up to 2.0.6 are affected by CVE-2019-13295.
To fix CVE-2019-13295, apply the patches provided by the respective vendors or update to the patched versions of ImageMagick or IBM Data Risk Manager.
You can find more information about CVE-2019-13295 on the following references: [1], [2], [3].