Name | CVE-2023-1289 |
Description | A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1033254 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
imagemagick (PTS) | buster | 8:6.9.10.23+dfsg-2.1+deb10u1 | vulnerable |
buster (security) | 8:6.9.10.23+dfsg-2.1+deb10u5 | vulnerable | |
bullseye (security), bullseye | 8:6.9.11.60+dfsg-1.3+deb11u1 | vulnerable | |
bookworm, sid, trixie | 8:6.9.11.60+dfsg-1.6 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
imagemagick | source | (unstable) | (unfixed) | 1033254 |
[bookworm] - imagemagick <no-dsa> (Minor issue)
[bullseye] - imagemagick <no-dsa> (Minor issue)
[buster] - imagemagick <postponed> (Should be fixed together with some other CVEs)
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4