First published: Mon Jun 12 2023(Updated: )
A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.1.1 | <10 | 10 |
ImageMagick | <7.1.1-10 | |
Fedora EPEL | =8.0 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34474 is a heap-based buffer overflow issue in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c.
CVE-2023-34474 can allow a local attacker to trick the user into opening a specially crafted file, resulting in an out-of-bounds read error and a denial of service.
CVE-2023-34474 has a severity rating of medium with a severity value of 5.5.
To fix CVE-2023-34474, update ImageMagick to version 7.1.1-10 or apply the recommended remedy from RedHat.
You can find more information about CVE-2023-34474 in the references provided: [Link 1](https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2214156), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2214154)