Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-25667

Опубликовано: 13 окт. 2019
Источник: redhat
CVSS3: 5.5

Описание

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for "dc:format=\"image/dng\" within profile due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

A flaw was found in TIFFGetProfiles() in /coders/tiff.c calls strstr(), which causes a large out-of-bounds read when it searches for "dc:format=\"image/dng\" within profile due to improper string handling when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this issue. The highest threat from this vulnerability is to system availability.

Отчет

This flaw is out of support scope for Red Hat Enterprise Linux 5, 6, and 7. Inkscape is not affected because it no longer uses a bundled ImageMagick in Red Hat Enterprise Linux 8. For more information regarding support scopes, please see https://access.redhat.com/support/policy/updates/errata .

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ImageMagickOut of support scope
Red Hat Enterprise Linux 6ImageMagickOut of support scope
Red Hat Enterprise Linux 7ImageMagickOut of support scope
Red Hat Enterprise Linux 8inkscapeNot affected
Red Hat Enterprise Linux 9ImageMagickAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1891613ImageMagick: heap-based buffer overflow in TIFFGetProfiles in coders/tiff.c

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 5 лет назад

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

CVSS3: 5.5
nvd
около 5 лет назад

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

CVSS3: 5.5
debian
около 5 лет назад

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a larg ...

github
больше 3 лет назад

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

5.5 Medium

CVSS3