In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106227 | vdb entry third party advisory |
https://sourceforge.net/p/graphicsmagick/bugs/585/ | third party advisory exploit |
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/648e2b406589 | mailing list patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/12/msg00018.html | third party advisory mailing list |
https://usn.ubuntu.com/4207-1/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4640 | vendor advisory |