In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
References
Link | Resource |
---|---|
https://sourceforge.net/p/graphicsmagick/bugs/583/ | Exploit Third Party Advisory |
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/15d1b5fd003b | Patch Vendor Advisory |
http://www.securityfocus.com/bid/106229 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/12/msg00018.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4207-1/ | |
https://www.debian.org/security/2020/dsa-4640 |
Information
Published : 2018-12-17 11:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-20184
Mitre link : CVE-2018-20184
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
graphicsmagick
- graphicsmagick