In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://github.com/ImageMagick/ImageMagick/issues/870 | third party advisory exploit |
https://usn.ubuntu.com/3681-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/01/msg00000.html | third party advisory mailing list |
http://www.securityfocus.com/bid/102202 | vdb entry third party advisory |
https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html | mailing list |
https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html | mailing list |