First published: Tue Sep 11 2018(Updated: )
In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file. Upstream issue: <a href="https://github.com/ImageMagick/ImageMagick/issues/1119">https://github.com/ImageMagick/ImageMagick/issues/1119</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick6/commit/1007b98f8795ad4bea6bc5f68a32d83e982fdae4">https://github.com/ImageMagick/ImageMagick6/commit/1007b98f8795ad4bea6bc5f68a32d83e982fdae4</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick | <=7.0.7-29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1627916 is considered significant due to its potential to cause denial of service.
To fix REDHAT-BUG-1627916, upgrade ImageMagick to a version later than 7.0.7-29 where the vulnerability has been addressed.
The vulnerability in REDHAT-BUG-1627916 is caused by a missing NULL check in ReadOneJNGImage in coders/png.c.
ImageMagick versions up to and including 7.0.7-29 are affected by REDHAT-BUG-1627916.
REDHAT-BUG-1627916 can lead to application crashes and denial of service due to WriteBlob assertion failures.