Page 67 of 446 results (0.011 seconds)

CVSS: 9.8EPSS: 1%CPEs: 16EXPL: 0

Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact. Desbordamiento de búfer en la función ReadRLEImage en coders/rle.c en ImageMagick 6.8.9.9 permite a atacantes remotos tener impacto no especificado. • http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-08 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 0

The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file. La función ReadRLEImage en coders/rle.c en ImageMagick 6.8.9.9 permite a atacantes remotos provocar una denegación de servicio (lectura fuera de límites) a través de un archivo de imagen manipulado. • http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html http://www.openwall.com/lists/oss-security/2016/06/02 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 45EXPL: 0

Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file. Vulnerabilidad de liberación doble en coders/tga.c en ImageMagick 7.0.0 y versiones posteriores permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un archivo tga manipulado. • http://www.openwall.com/lists/oss-security/2016/06/02/13 https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8 • CWE-415: Double Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption. La pérdida de memoria en la función IsOptionMember en MagickCore/option.c en ImageMagick en versiones anteriores a 6.9.2-2, tal como se utiliza en ODR-PadEnc y otros productos, permite a atacantes desencadenar el consumo de memoria. • http://git.imagemagick.org/repos/ImageMagick/commit/6790815c75bdea0357df5564345847856e995d6b http://www.debian.org/security/2017/dsa-3808 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857426 https://github.com/Opendigitalradio/ODR-PadEnc/issues/2 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Magick++ in ImageMagick 6.9.7. A specially crafted file creating a nested exception could lead to a memory leak (thus, a DoS). Ha sido descubierto un problema en Magick++ en ImageMagick 6.9.7. Un archivo especialmente manipulado que crea una excepción anidada podría conducir a una pérdida de memoria (en consecuencia, un DoS). • http://www.debian.org/security/2017/dsa-3808 http://www.securityfocus.com/bid/96590 https://bugs.debian.org/856880 https://github.com/ImageMagick/ImageMagick/commit/3358f060fc182551822576b2c0a8850faab5d543 https://www.imagemagick.org/discourse-server/viewtopic.php?f=23&p=142634 • CWE-772: Missing Release of Resource after Effective Lifetime •