Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: normal
Tags: upstream security
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/715

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14172[0]:
| In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due
| to lack of an EOF (End of File) check might cause huge CPU consumption.
| When a crafted PSD file, which claims a large "extent" field in the
| header but does not contain sufficient backing data, is provided, the
| loop over "length" would consume huge CPU resources, since there is no
| EOF check inside the loop.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14172
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172
[1] https://github.com/ImageMagick/ImageMagick/issues/715
[2] 
https://github.com/ImageMagick/ImageMagick/commit/8598a497e2d1f556a34458cf54b40ba40674734c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to