Page 107 of 646 results (0.006 seconds)

CVSS: 7.8EPSS: 6%CPEs: 40EXPL: 0

Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache. La pérdida de memoria en los coders/mpc.c en ImageMagick en versiones anteriores a 6.9.7-4 y 7.x en versiones anteriores a 7.0.4-4 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de vectores que implican una caché de píxeles. • http://www.debian.org/security/2017/dsa-3799 http://www.openwall.com/lists/oss-security/2017/01/16/6 http://www.openwall.com/lists/oss-security/2017/01/17/5 http://www.securityfocus.com/bid/95752 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 https://github.com/ImageMagick/ImageMagick/blob/6.9.7-4/ChangeLog https://github.com/ImageMagick/ImageMagick/blob/7.0.4-4/ChangeLog https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 https:& • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors. Varias pérdidas de memoria en la leyenda y el código de manejo de etiquetas en ImageMagick permiten a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de vectores no especificados. • http://www.debian.org/security/2017/dsa-3799 http://www.openwall.com/lists/oss-security/2017/01/16/6 http://www.openwall.com/lists/oss-security/2017/01/17/5 http://www.securityfocus.com/bid/95744 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851380 https://github.com/ImageMagick/ImageMagick/commit/aeff00de228bc5a158c2a975ab47845d8a1db456 https://security.gentoo.org/glsa/201702-09 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 0

Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file. La vulnerabilidad de liberación doble en magick/profile.c en ImageMagick permite a los atacantes remotos tener un impacto no especificado a través de un archivo manipulado. • http://www.debian.org/security/2017/dsa-3799 http://www.openwall.com/lists/oss-security/2017/01/16/6 http://www.openwall.com/lists/oss-security/2017/01/17/5 http://www.securityfocus.com/bid/95753 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851383 https://github.com/ImageMagick/ImageMagick/commit/9a069e0f2e027ec5138f998023cf9cb62c04889f https://github.com/ImageMagick/ImageMagick/issues/354 https://security.gentoo.org/glsa/201702-09 • CWE-415: Double Free •

CVSS: 5.5EPSS: 1%CPEs: 37EXPL: 0

Heap-based buffer overflow in the PushQuantumPixel function in ImageMagick before 6.9.7-3 and 7.x before 7.0.4-3 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF file. El desbordamiento de búfer basado en memoria dinámica en la función PushQuantumPixel de ImageMagick en versiones anteriores a 6.9.7-3 y 7.x en versiones anteriores a 7.0.4-3 permite a los atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de un archivo TIFF manipulado. • http://www.debian.org/security/2017/dsa-3799 http://www.openwall.com/lists/oss-security/2017/01/16/6 http://www.openwall.com/lists/oss-security/2017/01/17/5 http://www.securityfocus.com/bid/95748 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851381 https://github.com/ImageMagick/ImageMagick/blob/6.9.7-3/ChangeLog https://github.com/ImageMagick/ImageMagick/blob/7.0.4-3/ChangeLog https://github.com/ImageMagick/ImageMagick/commit/c073a7712d82476b5fbee74856c46b88af9c3175 https:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 0

coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write. Coders/psd.c en ImageMagick permite a los atacantes remotos tener un impacto no especificado a través de un archivo PSD manipulado, lo que desencadena una escritura fuera de los límites. • http://www.openwall.com/lists/oss-security/2017/01/16/6 http://www.openwall.com/lists/oss-security/2017/01/17/5 http://www.securityfocus.com/bid/95751 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851377 https://github.com/ImageMagick/ImageMagick/commit/37a1710e2dab6ed91128ea648d654a22fbe2a6af https://github.com/ImageMagick/ImageMagick/commit/d4ec73f866a7c42a2e7f301fcd696e5cb7a7d3ab https://github.com/ImageMagick/ImageMagick/issues/350 https://security.gentoo.org/glsa/201702-09 • CWE-787: Out-of-bounds Write •