Heap-based buffer overflow in GraphicsMagick - CVE-2017-13063
Published: August 22, 2017 / Updated: August 3, 2020
GraphicsMagick
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the the function GetStyleTokens in coders/svg.c:314:12. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2017-13063
Sources
- http://hg.code.sf.net/p/graphicsmagick/code/rev/54f48ab2d52a
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
- https://sourceforge.net/p/graphicsmagick/bugs/434/
- https://usn.ubuntu.com/4222-1/
- https://www.debian.org/security/2018/dsa-4321