Imagemagick

Imagemagick

725 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:45

In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPi...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:46

in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:46

In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could im...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:46

A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:21:46

A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lea...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:18:25

WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:18:26

In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by Undefin...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:18:26

In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being use...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:21:45

A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `uns...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:21:45

A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a...