A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2023196 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/issues/4446 | Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e | Patch Third Party Advisory |
Configurations
Information
Published : 2021-11-19 09:15
Updated : 2021-11-28 15:31
NVD link : CVE-2021-3962
Mitre link : CVE-2021-3962
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
imagemagick
- imagemagick