First published: Fri Mar 23 2018(Updated: )
A flaw was found in ImageMagick 7.0.7-25 Q16. WriteEPTImage function in coders/ept.c allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file. Reference: <a href="https://github.com/ImageMagick/ImageMagick/issues/1025">https://github.com/ImageMagick/ImageMagick/issues/1025</a> Patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/6355db269e03f879c516cf9d592c72e157bc75d6">https://github.com/ImageMagick/ImageMagick/commit/6355db269e03f879c516cf9d592c72e157bc75d6</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1559892 is classified as a denial of service vulnerability due to possible application crash.
To fix REDHAT-BUG-1559892, update ImageMagick to the latest version where this vulnerability is resolved.
ImageMagick versions prior to the fix are affected by REDHAT-BUG-1559892.
Yes, REDHAT-BUG-1559892 can be exploited remotely via a crafted file.
The impact of REDHAT-BUG-1559892 includes denial of service and potential unspecified other impacts.