Name | CVE-2017-14528 |
Description | The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2523-1 |
Debian Bugs | 878544 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
imagemagick (PTS) | bullseye | 8:6.9.11.60+dfsg-1.3+deb11u4 | fixed |
| bullseye (security) | 8:6.9.11.60+dfsg-1.3+deb11u3 | fixed |
| bookworm | 8:6.9.11.60+dfsg-1.6+deb12u2 | fixed |
| bookworm (security) | 8:6.9.11.60+dfsg-1.6+deb12u1 | fixed |
| trixie | 8:6.9.13.12+dfsg1-1 | fixed |
| sid | 8:7.1.1.39+dfsg1-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[jessie] - imagemagick <not-affected> (Vulnerable code not present)
[wheezy] - imagemagick <not-affected> (Can't reproduce crash with file)
http://bugzilla.maptools.org/show_bug.cgi?id=2730
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32560
https://github.com/ImageMagick/ImageMagick6/commit/6f7cba13ebae405b2689647a2277827f1c272364