First published: Mon Jun 12 2023(Updated: )
A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could pass specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service. <a href="https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0">https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.1.1 | <10 | 10 |
ImageMagick | <7.1.1-10 | |
Fedora EPEL | =8.0 | |
Fedora | =37 | |
Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34475 is a heap use after free vulnerability in ImageMagick's ReplaceXmpValue() function.
The severity of CVE-2023-34475 is medium, with a severity value of 5.5.
CVE-2023-34475 affects ImageMagick versions 7.1.1 up to but excluding version 10.
An attacker can exploit CVE-2023-34475 by tricking a user into opening a specially crafted file to convert, triggering a heap-use-after-free write error.
Yes, a fix is available for CVE-2023-34475. It is recommended to update to ImageMagick version 10 or above.