Page 21 of 284 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 58EXPL: 0

In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. En ImageMagick en versiones anteriores a la 6.9.8-8 y 7.x en versiones anteriores a la 7.0.5-9, la función ReadJP2Image en coders/jp2.c no valida correctamente la geometría del canal, lo que conduce a un bloqueo. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869830 https://github.com/ImageMagick/ImageMagick/commit/acee073df34aa4d491bf5cb74d3a15fc80f0a3aa https://github.com/ImageMagick/ImageMagick/commit/f13c6b54a879aaa771ec64b5a066b939e8f8e7f0 https://github.com/ImageMagick/ImageMagick/issues/501 https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html https://security.gentoo.org/glsa/201711-07 https://usn.ubuntu.com/3681-1 https://www.debian.org/security/2017/dsa-4019 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 58EXPL: 2

In ImageMagick before 6.9.9-1 and 7.x before 7.0.6-2, the ReadOnePNGImage function in coders/png.c allows remote attackers to cause a denial of service (application hang in LockSemaphoreInfo) via a PNG file with a width equal to MAGICK_WIDTH_LIMIT. En ImageMagick en versiones anteriores a la 6.9.9-1 y 7.x en versiones anteriores a la 7.0.6-2, la función ReadOnePNGImage en coders/png.c permite que atacantes remotos provoquen una denegación de servicio (bloqueo de la aplicación en LockSemaphoreInfo) mediante un archivo PNG con un ancho igual a MAGICK_WIDTH_LIMIT. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870111 https://github.com/ImageMagick/ImageMagick/issues/596 https://security.gentoo.org/glsa/201711-07 https://www.debian.org/security/2017/dsa-4019 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 49EXPL: 0

In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c. En ImageMagick en versiones anteriores a la 6.9.8-5 y 7.x en versiones anteriores a la 7.0.5-6, existe una fuga de memoria en la función ReadMATImage en coders/mat.c. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013 https://github.com/ImageMagick/ImageMagick/commit/79e5dbcdd1fc2f714f9bae548bc55d5073f3ed20 https://security.gentoo.org/glsa/201711-07 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

In ImageMagick before 6.9.7-6 and 7.x before 7.0.4-6, the ReadMATImage function in coders/mat.c uses uninitialized data, which might allow remote attackers to obtain sensitive information from process memory. En ImageMagick en versiones anteriores a la 6.9.7-6 y 7.x en versiones anteriores a la 7.0.4-6, la función ReadMATImage en coders/mat.c emplea datos sin inicializar, lo que podría permitir que atacantes remotos obtengan información sensible de la memoria de proceso. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870012 https://github.com/ImageMagick/ImageMagick/commit/51b0ae01709adc1e4a9245e158ef17b85a110960 https://github.com/ImageMagick/ImageMagick/issues/362 https://security.gentoo.org/glsa/201711-07 https://usn.ubuntu.com/3681-1 https://www.debian.org/security/2017/dsa-4019 https://www.debian.org/security/2018/dsa-4204 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

In ImageMagick before 6.9.7-10, there is a crash (rather than a "width or height exceeds limit" error report) if the image dimensions are too large, as demonstrated by use of the mpc coder. En ImageMagick en versiones anteriores a la 6.9.7-10, hay un bloqueo (en vez de un informe de error "width or height exceeds limit") si las dimensiones de la imagen son demasiado grandes, tal y como demuestra el uso del coder mp3. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869728 https://security.gentoo.org/glsa/201711-07 https://usn.ubuntu.com/3681-1 https://www.debian.org/security/2017/dsa-4019 https://www.debian.org/security/2017/dsa-4040 https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31438 • CWE-20: Improper Input Validation •