Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-19948 CVE-2019-19949 |
CWE-ID | CWE-122 CWE-125 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #2 is available. |
Vulnerable software Subscribe |
ImageMagick Client/Desktop applications / Multimedia software |
Vendor | ImageMagick.org |
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU24029
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-19948
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due insufficient validation of row and column sizes in the "WriteSGIImage" function of coders/sgi.c. A remote attacker can trigger heap-based buffer overflow and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsImageMagick: 7.0.8-43 Q16
http://github.com/ImageMagick/ImageMagick/issues/1562
http://lists.debian.org/debian-lts-announce/2019/12/msg00033.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU24030
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-19949
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due missing length check prior pointer dereference in the "WritePNGImage" function of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare. A remote attacker can cause a denial of service condition on the target system.
Install update from vendor's website.
Vulnerable software versionsImageMagick: 7.0.8-43 Q16
http://github.com/ImageMagick/ImageMagick/issues/1561
http://lists.debian.org/debian-lts-announce/2019/12/msg00033.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?