CVE-2017-14682
Published: 21 September 2017
GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
Upstream |
Released
(8:6.9.9.34+dfsg-3)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(8:6.9.7.4+dfsg-16ubuntu6.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(8:6.8.9.9-7ubuntu5.11)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [8:6.7.7.10-6ubuntu3.11])
|
|
Patches: Upstream: https://github.com/ImageMagick/ImageMagick/commit/3bee958ee63eb6ec62834d0c7b28b4b6835e6a00 |
Notes
Author | Note |
---|---|
mdeslaur | 0322-CVE-2017-14682-Fix-heap-based-buffer-overflow-in-GetNextToken.patch in wheezy 0253-CVE-2017-14682.patch in jessie 0105-CVE-2017-14682.patch in stretch |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726
- https://usn.ubuntu.com/usn/usn-3681-1
- NVD
- Launchpad
- Debian