First published: Wed Mar 01 2017(Updated: )
ImageMagick and GraphicsMagick encounter a read beyond an allocated heap buffer when reading CMYKA TIFF files which claim to offer fewer samples per pixel than required. A maliciously crafted file could cause the application to crash. References: <a href="http://seclists.org/oss-sec/2017/q1/494">http://seclists.org/oss-sec/2017/q1/494</a> Upstream patch: <a href="https://sourceforge.net/p/graphicsmagick/code/ci/6156b4c2992d855ece6079653b3b93c3229fc4b8/">https://sourceforge.net/p/graphicsmagick/code/ci/6156b4c2992d855ece6079653b3b93c3229fc4b8/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | ||
GraphicsMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1427975 is considered high due to the potential for application crashes from maliciously crafted CMYKA TIFF files.
To fix REDHAT-BUG-1427975, update to the latest stable version of ImageMagick or GraphicsMagick that contains the patch for this vulnerability.
REDHAT-BUG-1427975 affects ImageMagick and GraphicsMagick when processing CMYKA TIFF files.
Yes, REDHAT-BUG-1427975 can be exploited remotely through a malicious TIFF file sent to the application.
Opening a vulnerable file with affected software exposed to REDHAT-BUG-1427975 could result in the application crashing.