CVE-2017-14682
Published: 21 September 2017
GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
artful |
Released
(8:6.9.7.4+dfsg-16ubuntu2.2)
|
bionic |
Released
(8:6.9.7.4+dfsg-16ubuntu6.2)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was released [8:6.7.7.10-6ubuntu3.11])
|
|
upstream |
Released
(8:6.9.9.34+dfsg-3)
|
|
xenial |
Released
(8:6.8.9.9-7ubuntu5.11)
|
|
zesty |
Ignored
(reached end-of-life)
|
Notes
Author | Note |
---|---|
mdeslaur | 0322-CVE-2017-14682-Fix-heap-based-buffer-overflow-in-GetNextToken.patch in wheezy 0253-CVE-2017-14682.patch in jessie 0105-CVE-2017-14682.patch in stretch |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726
- https://ubuntu.com/security/notices/USN-3681-1
- NVD
- Launchpad
- Debian