In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://sourceforge.net/p/graphicsmagick/bugs/600/ | third party advisory exploit |
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html | mailing list third party advisory vendor advisory |
https://usn.ubuntu.com/4207-1/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4640 | vendor advisory |