First published: Mon Jun 12 2023(Updated: )
A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 6.9.12 | <26 | 26 |
redhat/ImageMagick 7.1.0 | <11 | 11 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 | |
ImageMagick ImageMagick | <6.9.12-26 | |
ImageMagick ImageMagick | >=7.1.1-0<7.1.1-10 | |
Fedora EPEL | =8.0 | |
Fedora | =37 | |
Fedora | =38 | |
ImageMagick | <6.9.12-26 | |
ImageMagick | >=7.1.1-0<7.1.1-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3195 is a stack-based buffer overflow issue found in ImageMagick's coders/tiff.c.
An attacker can exploit CVE-2023-3195 by tricking the user into opening a specially crafted malicious tiff file.
The impact of CVE-2023-3195 is a denial of service, causing the application to crash.
ImageMagick 6.9.12 up to exclusive version 26 and ImageMagick 7.1.0 up to exclusive version 11 are affected.
To mitigate the vulnerability, update ImageMagick to version 6.9.12-27 or higher, or version 7.1.1-11 or higher.