Vulnerability Name: | CVE-2018-20189 (CCN-154431) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-12-17 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-12-17 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-12-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
3.0 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20189 Source: MISC Type: Mailing List, Patch, Vendor Advisory http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/648e2b406589 Source: BID Type: Third Party Advisory, VDB Entry 106227 Source: XF Type: UNKNOWN graphicsmagick-cve201820189-dos(154431) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20181227 [SECURITY] [DLA 1619-1] graphicsmagick security update Source: CCN Type: GraphicsMagick Web page #585 Assertion Failure in coders/png.c:7503 Source: MISC Type: Exploit, Third Party Advisory https://sourceforge.net/p/graphicsmagick/bugs/585/ Source: UBUNTU Type: UNKNOWN USN-4207-1 Source: DEBIAN Type: UNKNOWN DSA-4640 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |