CVE-2017-14528

The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2730 Exploit Issue Tracking Third Party Advisory
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32560 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/100875 Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:imagemagick:imagemagick:7.0.6:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2017-09-17 17:29

Updated : 2021-03-04 12:34


NVD link : CVE-2017-14528

Mitre link : CVE-2017-14528


JSON object : View

CWE
CWE-416

Use After Free

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

imagemagick

  • imagemagick