Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14137

Опубликовано: 04 сент. 2017
Источник: debian

Описание

ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
imagemagickfixed8:6.9.9.34+dfsg-3package
imagemagicknot-affectedwheezypackage

Примечания

  • https://github.com/ImageMagick/ImageMagick/issues/641

  • https://github.com/ImageMagick/ImageMagick/commit/cb63560ba25e4a6c51ab282538c24877fff7d471

  • ImageMagick-6: https://github.com/ImageMagick/ImageMagick/commit/cfc2bd4c87481d4cf60308cc6ffd3c61288ff004

  • ImageMagick in Debian not compiled with webp support (--with-webp=yes)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.

CVSS3: 3.3
redhat
больше 8 лет назад

ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.

CVSS3: 7.5
nvd
больше 8 лет назад

ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.

CVSS3: 7.5
github
больше 3 лет назад

ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.

fstec
больше 8 лет назад

Уязвимость функции ReadWEBPImage (coders/webp.c) консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании