First published: Tue May 22 2018(Updated: )
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadTXTImage in coders/txt.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted image file that is mishandled in a GetImageIndexInList call. References: <a href="https://github.com/ImageMagick/ImageMagick/issues/910">https://github.com/ImageMagick/ImageMagick/issues/910</a> Patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/d95991f24d27dbc335dfa7c0523c886ab9329e9e">https://github.com/ImageMagick/ImageMagick/commit/d95991f24d27dbc335dfa7c0523c886ab9329e9e</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1581489 is classified as a moderate denial of service risk due to CPU exhaustion.
To fix REDHAT-BUG-1581489, update ImageMagick to the latest version that addresses the infinite loop vulnerability.
REDHAT-BUG-1581489 is caused by an infinite loop in the ReadTXTImage function when processing a specially crafted image file.
ImageMagick versions prior to the patch addressing REDHAT-BUG-1581489 are affected, particularly version 7.0.7-16.
The impact of the REDHAT-BUG-1581489 vulnerability is denial of service (CPU exhaustion) affecting the performance and availability of the affected system.