New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heap-buffer-overflow in function SampleImage() in resize.c #717
Comments
|
Thanks for the problem report. We can reproduce it and will have a patch to fix it in GIT master branch @ https://github.com/ImageMagick/ImageMagick later today. The patch will be available in the beta releases of ImageMagick @ https://www.imagemagick.org/download/beta/ by sometime tomorrow. |
|
This was assigned CVE-2017-14248. |
|
@urban-warrior, @dlemstra, can you confirm if this issue does not affect ImageMagick-6? |
|
This is an IM7 only issue. |
|
Confirmed. This bug was exclusive to IMv7, not IMv6. |
Version: ImageMagick 7.0.6-8 Q16 x86_64
A heap buffer overflow vulnerability was found in function SampleImage() in resize.c ,which allow attackers to cause a denial of service or remote code execution via a crafted file.
A bug was triggered when convert a file to pdf using ImageMagick , I use the command line
" ./magick convert 1-im2pdf out.pdf " and the asan shows:
The poc was at: https://github.com/lifuhao123/feijidepoc/blob/master/1-im2pdf
Note that this issue was found by lifuhao from Aliyun Security Team.
Thanks
The text was updated successfully, but these errors were encountered: