First published: Thu Apr 05 2018(Updated: )
A flaw was found in ImageMagick 7.0.7-26 Q16. An excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file. References: <a href="https://github.com/ImageMagick/ImageMagick/issues/1072">https://github.com/ImageMagick/ImageMagick/issues/1072</a> Patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/089fca04e0130549fa15f48ace3f56e30a06049a">https://github.com/ImageMagick/ImageMagick/commit/089fca04e0130549fa15f48ace3f56e30a06049a</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1563875 is significant due to its potential to cause denial of service.
To fix REDHAT-BUG-1563875, update to the latest version of ImageMagick that includes the necessary patches.
REDHAT-BUG-1563875 is caused by excessive iterations in the DecodeLabImage and EncodeLabImage functions within ImageMagick.
Yes, REDHAT-BUG-1563875 can be exploited remotely by attackers using crafted TIFF files to trigger the vulnerability.
The impact of REDHAT-BUG-1563875 on systems includes prolonged hangs and potential denial of service.