The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file.
References
Link | Resource |
---|---|
http://bugzilla.maptools.org/show_bug.cgi?id=2730 | Exploit Issue Tracking Third Party Advisory |
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32560 | Issue Tracking Vendor Advisory |
http://www.securityfocus.com/bid/100875 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html | Mailing List Third Party Advisory |
Information
Published : 2017-09-17 17:29
Updated : 2021-03-04 12:34
NVD link : CVE-2017-14528
Mitre link : CVE-2017-14528
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
imagemagick
- imagemagick