First published: Wed Mar 28 2018(Updated: )
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file. References: <a href="https://github.com/ImageMagick/ImageMagick/issues/808">https://github.com/ImageMagick/ImageMagick/issues/808</a> Patches: <a href="https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed">https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed</a> <a href="https://github.com/ImageMagick/ImageMagick/commit/53ea13989003cdb4955024f95b4a0158a2e871c6">https://github.com/ImageMagick/ImageMagick/commit/53ea13989003cdb4955024f95b4a0158a2e871c6</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1561744 is considered moderate due to its potential for denial of service.
To fix REDHAT-BUG-1561744, you should update ImageMagick to the latest version available.
The vulnerability in REDHAT-BUG-1561744 is caused by a memory leak in the WriteGIFImage function within ImageMagick.
Yes, REDHAT-BUG-1561744 can be exploited remotely using a crafted GIF file.
REDHAT-BUG-1561744 affects ImageMagick version 7.0.7 and possibly earlier versions.