The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://github.com/ImageMagick/ImageMagick/issues/1472 | exploit third party advisory patch |
https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | third party advisory patch |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html | vendor advisory |
https://usn.ubuntu.com/4034-1/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html | mailing list |
https://www.debian.org/security/2020/dsa-4712 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html | mailing list |