SB2017101125 - Use-after-free in GraphicsMagick
Published: October 11, 2017 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2017-15238)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26 has a use-after-free issue when the height or width is zero, related to ReadJNGImage.
Remediation
Install update from vendor's website.
References
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=93bdb9b30076
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=df946910910d
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
- https://sourceforge.net/p/graphicsmagick/bugs/469/
- https://www.debian.org/security/2018/dsa-4321