CVE-2017-16547

Published: 06 November 2017

The DrawImage function in magick/render.c in GraphicsMagick 1.3.26 does not properly look for pop keywords that are associated with push keywords, which allows remote attackers to cause a denial of service (negative strncpy and application crash) or possibly have unspecified other impact via a crafted file.

From the Ubuntu security team

It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
graphicsmagick
Launchpad, Ubuntu, Debian
Upstream
Released (1.3.26-18)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.3.26-18)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.3.26-18)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.3.26-18)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.3.23-1ubuntu0.5)
Ubuntu 14.04 ESM (Trusty Tahr) Needed

Patches:
Upstream: http://hg.code.sf.net/p/graphicsmagick/code/rev/785758bbbfcc