First published: Fri Jul 05 2019(Updated: )
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.8-50-q16 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
redhat/ImageMagick 7.0.8 | <50 | 50 |
redhat/ImageMagick 6.9.10 | <50 | 50 |
IBM Data Risk Manager | <=2.0.6 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13305 is a vulnerability in ImageMagick 7.0.8-50 Q16 that can be exploited to cause a denial of service.
CVE-2019-13305 has a severity rating of 7.8 out of 10.
The affected software versions include IBM Data Risk Manager 2.0.6, ImageMagick 7.0.8-50, and ImageMagick 6.9.10.
To fix CVE-2019-13305, you can apply the available patches provided by the respective vendors: IBM for Data Risk Manager and Red Hat or Ubuntu for ImageMagick.
You can refer to the following references for more information about CVE-2019-13305: the OpenSUSE security announcement, the ImageMagick GitHub commit, and the ImageMagick GitHub issue.