Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1114

Опубликовано: 29 апр. 2022
Источник: debian
EPSS Низкий

Описание

A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
imagemagickfixed8:6.9.11.60+dfsg-1.5package
imagemagickfixed8:6.9.11.60+dfsg-1.3+deb11u2bullseyepackage
imagemagicknot-affectedbusterpackage
imagemagicknot-affectedstretchpackage

Примечания

  • https://github.com/ImageMagick/ImageMagick/issues/4947

  • https://github.com/ImageMagick/ImageMagick6/commit/78f03b619d08d7c2e0fcaccab407e3ac93c2ee8f

EPSS

Процентиль: 24%
0.00077
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 3 лет назад

A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.

CVSS3: 6.1
redhat
больше 3 лет назад

A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.

CVSS3: 7.1
nvd
около 3 лет назад

A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.

CVSS3: 7.1
github
около 3 лет назад

A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.

CVSS3: 6.8
fstec
больше 3 лет назад

Уязвимость функции RelinquishDCMInfo() компонента dcm.c консольного графического редактора ImageMagick, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

EPSS

Процентиль: 24%
0.00077
Низкий