In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106229 | vdb entry third party advisory |
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/15d1b5fd003b | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/12/msg00018.html | third party advisory mailing list |
https://sourceforge.net/p/graphicsmagick/bugs/583/ | third party advisory exploit |
https://usn.ubuntu.com/4207-1/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4640 | vendor advisory |