Imagemagick

Imagemagick

725 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:23

A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:23

In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by add...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:24

The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:24

There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these ca...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:24

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The pat...

Exploit
  • EPSS 68.75%
  • Veröffentlicht 07.12.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:17

ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to a...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero....

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lea...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely le...