First published: Mon Oct 14 2019(Updated: )
ImageMagick is vulnerable to a heap-based buffer overflow, caused by a flaw in the ReadPSInfo function in coders/ps.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imagemagick | 8:6.9.10.23+dfsg-2.1+deb10u1 8:6.9.10.23+dfsg-2.1+deb10u5 8:6.9.11.60+dfsg-1.3+deb11u1 8:6.9.11.60+dfsg-1.6 | |
ImageMagick ImageMagick | >=6.9.10-54<6.9.10-55 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.8-54 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
IBM Data Risk Manager | <=2.0.6 | |
redhat/ImageMagick 6.9.10 | <55 | 55 |
redhat/ImageMagick 7.0.8 | <54 | 54 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.