CVE-2018-20184
Ubuntu Security Notice USN-5974-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
En GraphicsMagick 1.4 snapshot-20181209 Q8, hay un desbordamiento de búfer basado en memoria dinámica (heap) en la función WriteTGAImage de tga.c, lo que permite que los atacantes provoquen una denegación de servicio (DoS) mediante un archivo de imagen manipulado. Esto se debe a que el número de filas o columnas puede sobrepasar las restricciones de dimensiones de pixel de la especificación TGA.
It was discovered that GraphicsMagick was not properly performing bounds checks when processing TGA image files, which could lead to a heap buffer overflow. If a user or automated system were tricked into processing a specially crafted TGA image file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that GraphicsMagick was not properly validating bits per pixel data when processing DIB image files. If a user or automated system were tricked into processing a specially crafted DIB image file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-17 CVE Reserved
- 2018-12-17 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106229 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2018/12/msg00018.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/graphicsmagick/bugs/583 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/15d1b5fd003b | 2020-08-24 |
URL | Date | SRC |
---|---|---|
https://usn.ubuntu.com/4207-1 | 2020-08-24 | |
https://www.debian.org/security/2020/dsa-4640 | 2020-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Graphicsmagick Search vendor "Graphicsmagick" | Graphicsmagick Search vendor "Graphicsmagick" for product "Graphicsmagick" | 1.4 Search vendor "Graphicsmagick" for product "Graphicsmagick" and version "1.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|