First published: Fri Nov 14 2014(Updated: )
An out-of-bounds memory access flaw was found in ImageMagick's JPEG decoder. A local attacker could potentially use this flaw to crash an application using ImageMagick to process a specially crafted JPEG image. The fix for this issue is available at: <a href="http://trac.imagemagick.org/changeset/16872">http://trac.imagemagick.org/changeset/16872</a> The reproducer (a specially crafted JPEG image) along with additional information on this flaw can be found at: <a href="http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26456">http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26456</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1164248 is considered critical due to the potential for application crashes.
To fix REDHAT-BUG-1164248, users should update to the latest version of ImageMagick where the vulnerability is patched.
REDHAT-BUG-1164248 is an out-of-bounds memory access flaw specifically in ImageMagick's JPEG decoder.
Local applications that utilize ImageMagick to process JPEG images are affected by REDHAT-BUG-1164248.
The impact of REDHAT-BUG-1164248 allows an attacker to potentially crash applications using ImageMagick with specially crafted JPEG images.