First published: Thu Nov 24 2016(Updated: )
A heap-buffer overflow vulnerability was found in ImageMagick in IsPixelGray function in pixel-accessor.h triggered by opening a malicious image. Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99">https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99</a> References: <a href="http://seclists.org/oss-sec/2016/q4/469">http://seclists.org/oss-sec/2016/q4/469</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1398198 is classified as critical due to the heap-buffer overflow vulnerability in ImageMagick.
To fix REDHAT-BUG-1398198, you should apply the latest patches or updates from ImageMagick that address this heap-buffer overflow issue.
If REDHAT-BUG-1398198 is exploited, it could allow an attacker to execute arbitrary code on the affected system.
REDHAT-BUG-1398198 affects various versions of ImageMagick, so it is essential to review your specific version for vulnerability.
You can determine if your system is vulnerable to REDHAT-BUG-1398198 by checking the installed version of ImageMagick against the known vulnerable versions listed in release notes or advisories.