First published: Wed Mar 28 2018(Updated: )
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file. References: <a href="https://github.com/ImageMagick/ImageMagick/issues/809">https://github.com/ImageMagick/ImageMagick/issues/809</a> Patches: <a href="https://github.com/ImageMagick/ImageMagick/commit/12a43437fec6f9245327636dc2730863bb9fdd8b">https://github.com/ImageMagick/ImageMagick/commit/12a43437fec6f9245327636dc2730863bb9fdd8b</a> <a href="https://github.com/ImageMagick/ImageMagick/commit/99718b41102f26f802311045e882aa947ef2941b">https://github.com/ImageMagick/ImageMagick/commit/99718b41102f26f802311045e882aa947ef2941b</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1561741 is classified as a denial of service vulnerability due to a memory leak in ImageMagick.
To fix REDHAT-BUG-1561741, upgrade ImageMagick to a version that addresses the identified memory leak.
The impact of REDHAT-BUG-1561741 allows remote attackers to cause a denial of service by exploiting a memory leak.
ImageMagick versions prior to the fix for REDHAT-BUG-1561741 are affected by this memory leak vulnerability.
Yes, REDHAT-BUG-1561741 can be exploited remotely using a specially crafted file.