GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:311:12.
References
Link | Resource |
---|---|
https://sourceforge.net/p/graphicsmagick/bugs/436/ | Third Party Advisory |
http://hg.code.sf.net/p/graphicsmagick/code/rev/54f48ab2d52a | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/100474 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4321 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/ | |
https://usn.ubuntu.com/4222-1/ |
Information
Published : 2017-08-21 23:29
Updated : 2019-06-29 20:15
NVD link : CVE-2017-13064
Mitre link : CVE-2017-13064
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
graphicsmagick
- graphicsmagick