First published: Wed Jun 28 2023(Updated: )
A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.1.1 | <19 | 19 |
ImageMagick | <7.1.1-19 | |
Fedora EPEL | =8.0 | |
Red Hat Fedora | ||
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 8:7.1.1.46+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow vulnerability is CVE-2023-3428.
You can find more information about this vulnerability in the references section of the vulnerability details.
The severity rating of CVE-2023-3428 is medium.
ImageMagick 7.1.1 and Fedora Project Extra Packages For Enterprise Linux 8.0 are affected by this vulnerability.
An attacker can trick the user into opening a specially crafted file, resulting in an application crash and denial of service.