ID CVE-2017-17500
Summary ReadRGBImage in coders/rgb.c in GraphicsMagick 1.3.26 has a magick/import.c ImportRGBQuantumType heap-based buffer over-read via a crafted file.
References
Vulnerable Configurations
  • GraphicsMagick 1.3.26
    cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26
  • Debian Linux 7.0
    cpe:2.3:o:debian:debian_linux:7.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
CVSS
Base: 6.8
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1231.NASL
    description The NSFocus Security Team discovered multiple security issues in Graphicsmagick, a collection of image processing tools. Several heap-based buffer over-reads may lead to a denial of service (application crash) or possibly have other unspecified impact when processing a crafted file. For Debian 7 'Wheezy', these problems have been fixed in version 1.3.16-1.1+deb7u16. We recommend that you upgrade your graphicsmagick packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-09
    plugin id 105659
    published 2018-01-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105659
    title Debian DLA-1231-1 : graphicsmagick security update
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1401.NASL
    description Various security issues were discovered in Graphicsmagick, a collection of image processing tools. Heap-based buffer overflows or overreads may lead to a denial of service or disclosure of in-memory information or other unspecified impact by processing a malformed image file. For Debian 8 'Jessie', these problems have been fixed in version 1.3.20-3+deb8u3. We recommend that you upgrade your graphicsmagick packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-07
    plugin id 110727
    published 2018-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110727
    title Debian DLA-1401-1 : graphicsmagick security update
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-213.NASL
    description This update for GraphicsMagick fixes the following issues : Security issues fixed : - CVE-2017-11533: An infoleak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (boo#1050132) - CVE-2017-17682: A large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (boo#1072898) - CVE-2017-17500: A heap-based buffer overread in the ImportRGBQuantumType was fixed that could lead to information leak or a crash (boo#1077737)
    last seen 2019-02-21
    modified 2018-02-28
    plugin id 107047
    published 2018-02-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107047
    title openSUSE Security Update : GraphicsMagick (openSUSE-2018-213)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4321.NASL
    description Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in denial of service or the execution of arbitrary code if malformed image files are processed.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118179
    published 2018-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118179
    title Debian DSA-4321-1 : graphicsmagick - security update
refmap via4
bid 102164
confirm
debian DSA-4321
mlist
  • [debian-lts-announce] 20180108 [SECURITY] [DLA 1231-1] graphicsmagick security update
  • [debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update
Last major update 10-12-2017 - 21:29
Published 10-12-2017 - 21:29
Last modified 29-06-2019 - 23:15
Back to Top