Vulnerability Name: | CVE-2017-18273 (CCN-143605) | ||||||||||||||||||||||||||||||||
Assigned: | 2017-12-21 | ||||||||||||||||||||||||||||||||
Published: | 2017-12-21 | ||||||||||||||||||||||||||||||||
Updated: | 2020-09-08 | ||||||||||||||||||||||||||||||||
Summary: | In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadTXTImage in coders/txt.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted image file that is mishandled in a GetImageIndexInList call. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
2.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-835 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-18273 Source: XF Type: UNKNOWN imagemagick-cve201718273-dos(143605) Source: CCN Type: ImageMagick GIT Repository cpu exhaustion in GetImageIndexInList #910 Source: CONFIRM Type: Exploit, Third Party Advisory https://github.com/ImageMagick/ImageMagick/issues/910 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20180523 [SECURITY] [DLA 1381-1] imagemagick security update Source: MLIST Type: UNKNOWN [debian-lts-announce] 20190514 [SECURITY] [DLA 1785-1] imagemagick security update Source: MLIST Type: UNKNOWN [debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update Source: UBUNTU Type: Third Party Advisory USN-3681-1 Source: CCN Type: IBM Security Bulletin 6335281 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |