The ReadOneJNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a malformed JNG file.
The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.
Link | Tags |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867824 | third party advisory |
https://github.com/ImageMagick/ImageMagick/issues/526 | third party advisory exploit |