First published: Wed Mar 28 2018(Updated: )
An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file. References: <a href="https://github.com/ImageMagick/ImageMagick/issues/802">https://github.com/ImageMagick/ImageMagick/issues/802</a> Patches: <a href="https://github.com/ImageMagick/ImageMagick/commit/bb04ccb34fd45e9c3020786857fb79b09f44d7db">https://github.com/ImageMagick/ImageMagick/commit/bb04ccb34fd45e9c3020786857fb79b09f44d7db</a> <a href="https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7">https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1561742 is classified as a denial of service vulnerability that can lead to application crashes.
To mitigate REDHAT-BUG-1561742, update ImageMagick to the latest version where the issue has been resolved.
REDHAT-BUG-1561742 affects ImageMagick versions prior to the fix implemented for this vulnerability.
Yes, attackers can exploit REDHAT-BUG-1561742 remotely by providing crafted files to an application that uses ImageMagick for processing.
Yes, a patch addressing REDHAT-BUG-1561742 is available and should be applied to affected installations of ImageMagick.