First published: Tue Apr 11 2023(Updated: )
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 | |
redhat/ImageMagick 6.9.12 | <84 | 84 |
redhat/ImageMagick 7.1.1 | <6 | 6 |
ImageMagick ImageMagick | <6.9.12-84 | |
ImageMagick ImageMagick | =7.1.1-4 | |
Fedoraproject Extra Packages for Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in ImageMagick is CVE-2023-1906.
CVE-2023-1906 has a severity rating of 5.5 (Medium).
The vulnerability in ImageMagick's ImportMultiSpectralQuantum() function is a heap-based buffer overflow issue.
The impact of CVE-2023-1906 is an application crash, resulting in a denial of service.
To fix the vulnerability in ImageMagick, it is recommended to update to version 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+ or later.