Описание
In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buffer over-read in ReadMNGImage in coders/png.c, related to accessing one byte before testing whether a limit has been reached.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1.3.27-3 |
| cosmic | not-affected | 1.3.27-3 |
| devel | not-affected | 1.3.27-3 |
| disco | not-affected | 1.3.27-3 |
| eoan | not-affected | 1.3.27-3 |
| esm-apps/bionic | not-affected | 1.3.27-3 |
| esm-apps/focal | not-affected | 1.3.27-3 |
| esm-apps/jammy | not-affected | 1.3.27-3 |
| esm-apps/xenial | released | 1.3.23-1ubuntu0.6 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buffer over-read in ReadMNGImage in coders/png.c, related to accessing one byte before testing whether a limit has been reached.
In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buff ...
In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buffer over-read in ReadMNGImage in coders/png.c, related to accessing one byte before testing whether a limit has been reached.
Уязвимость функции ReadMNGImage (coders/png.c) кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю выполнить произвольный код
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3