In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.
References
Link | Resource |
---|---|
https://github.com/ImageMagick/ImageMagick/issues/870 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/102202 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/01/msg00000.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3681-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html | |
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-12-13 22:29
Updated : 2020-09-07 17:15
NVD link : CVE-2017-17682
Mitre link : CVE-2017-17682
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
imagemagick
- imagemagick