coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2017/01/16/6 | mailing list third party advisory patch |
https://github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/95755 | vdb entry third party advisory broken link |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851376 | issue tracking third party advisory patch |
https://security.gentoo.org/glsa/201702-09 | third party advisory vendor advisory |
https://github.com/ImageMagick/ImageMagick/issues/348 | issue tracking third party advisory patch |
https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9 | issue tracking third party advisory |
http://www.debian.org/security/2017/dsa-3799 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2017/01/17/5 | mailing list third party advisory patch |