#VU39620 Infinite loop in ImageMagick


Published: 2017-02-28 | Updated: 2020-08-08

Vulnerability identifier: #VU39620

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-8903

CWE-ID: CWE-835

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ImageMagick
Client/Desktop applications / Multimedia software

Vendor: ImageMagick.org

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.

Mitigation
Install update from vendor's website.

Vulnerable software versions

ImageMagick: 6.0.0.7, 6.0.1 - 6.0.1.4, 6.0.2 - 6.0.2.7, 6.0.3 - 6.0.3.5, 6.0.4 - 6.0.4.4, 6.0.5 - 6.0.5.3, 6.0.6 - 6.0.6.2, 6.0.7 - 6.0.7.3, 6.0.8 - 6.0.8.3, 6.1.0.9, 6.1.1 - 6.1.1.6, 6.1.2 - 6.1.2.7, 6.1.3 - 6.1.3.7, 6.1.4 - 6.1.4.5, 6.1.5 - 6.1.5.8, 6.1.6 - 6.1.6.9, 6.1.7 - 6.1.7.5, 6.1.8 - 6.1.8.7, 6.1.9.4, 6.2.0.3 - 6.2.0.8, 6.2.1 - 6.2.1.7, 6.2.2 - 6.2.2.5, 6.2.3 - 6.2.3.6, 6.2.4 - 6.2.4.5, 6.2.8 - 6.2.8.3, 6.2.9 - 6.2.9.2, 6.3.0.0 - 6.3.0.8, 6.3.1 - 6.3.1.7, 6.3.2 - 6.3.2.8, 6.3.3 - 6.3.3_6, 6.3.4 - 6.3.4-10, 6.3.5 - 6.3.5-10, 6.3.6 - 6.3.6-10, 6.3.7 - 6.3.7-10, 6.3.8 - 6.3.8-10, 6.3.9 - 6.3.9-10, 6.4.0 - 6.4.0-11, 6.4.1 - 6.4.1-9, 6.4.2 - 6.4.2-10, 6.4.3 - 6.4.3-10, 6.4.4 - 6.4.4-8, 6.4.5 - 6.4.5-9, 6.4.6 - 6.4.6-9, 6.4.7-1 - 6.4.7-10, 6.4.8 - 6.4.8-10, 6.4.9 - 6.4.9-10, 6.5.0 - 6.5.0-10, 6.5.1 - 6.5.1-10, 6.5.2 - 6.5.2-10, 6.5.3 - 6.5.3-10, 6.5.4 - 6.5.4-10, 6.5.5 - 6.5.5-10, 6.5.6 - 6.5.6-10, 6.5.7 - 6.5.7-9, 6.5.8 - 6.5.8-9, 6.5.9 - 6.5.9-10, 6.6.0 - 6.6.0-10, 6.6.1 - 6.6.1-10, 6.6.2 - 6.6.2-10, 6.6.3 - 6.6.3-10, 6.6.4 - 6.6.4-10, 6.6.5 - 6.6.5-10, 6.6.6-0 - 6.6.6-10, 6.6.7-0 - 6.6.7-10, 6.6.8-0 - 6.6.8-10, 6.6.9-0 - 6.6.9-10, 6.7.0-0 - 6.7.0-10, 6.7.1-0 - 6.7.1-10, 6.7.2-0 - 6.7.2-10, 6.7.3-0 - 6.7.3-10, 6.7.4-0 - 6.7.4-10, 6.7.5-0 - 6.7.5-10, 6.7.6-0 - 6.7.6-10, 6.7.7-0 - 6.7.7.10, 6.7.8-0 - 6.7.8-10, 6.7.9-0 - 6.7.9-10, 6.8.0 - 6.8.0-10, 6.8.1-0 - 6.8.1-10, 6.8.2-0 - 6.8.2-10, 6.8.3-0 - 6.8.3-10, 6.8.4-0 - 6.8.4-10, 6.8.5-0 - 6.8.5-10, 6.8.6-0 - 6.8.6.9, 6.8.7-0 - 6.8.7-10, 6.8.8-0 - 6.8.8-10, 6.8.9-0 - 6.8.9.9, 6.9.0-0 - 6.9.0-4


External links
http://trac.imagemagick.org/changeset/17856
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26933
http://www.openwall.com/lists/oss-security/2015/02/26/13
http://www.openwall.com/lists/oss-security/2016/06/06/2
http://bugzilla.redhat.com/show_bug.cgi?id=1195271


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability