CVE-2022-1114
https://notcve.org/view.php?id=CVE-2022-1114
A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service. Se ha encontrado un fallo de uso de memoria previamente liberada de la pila en la función RelinquishDCMInfo() del archivo dcm.c de ImageMagick. Esta vulnerabilidad es desencadenada cuando un atacante pasa un archivo de imagen DICOM especialmente diseñado a ImageMagick para su conversión, conllevando potencialmente a una divulgación de información y una denegación de servicio • https://bugzilla.redhat.com/show_bug.cgi?id=2064538 • CWE-416: Use After Free •
CVE-2021-4219
https://notcve.org/view.php?id=CVE-2021-4219
A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system. Se ha encontrado un fallo en ImageMagick. La vulnerabilidad es producida debido al uso inapropiado de funciones abiertas y conlleva a una denegación de servicio. • https://bugzilla.redhat.com/show_bug.cgi?id=2054611 • CWE-20: Improper Input Validation •
CVE-2021-39212 – Issue when Configuring the ImageMagick Security Policy
https://notcve.org/view.php?id=CVE-2021-39212
ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain="module" rights="none" pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain="coder" rights="none" pattern="{PS,EPI,EPS,EPSF,EPSI}" />. • https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-668: Exposure of Resource to Wrong Sphere •