Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1581485 - (CVE-2017-18272) CVE-2017-18272 ImageMagick: use-after-free in ReadOneMNGImage function in coders/png.c
CVE-2017-18272 ImageMagick: use-after-free in ReadOneMNGImage function in cod...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20171225,reported=2...
: Security
Depends On: 1581487 1581490 1585901
Blocks: 1581491
  Show dependency treegraph
 
Reported: 2018-05-22 18:44 EDT by Laura Pardo
Modified: 2018-06-05 00:16 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-05-22 18:44:20 EDT
A flaw was found in ImageMagick 7.0.7-16 Q16 x86_64 2017-12-25, there is a use-after-free in ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted MNG image file that is mishandled in an MngInfoDiscardObject call.


References:
https://github.com/ImageMagick/ImageMagick/issues/918

Patch:
https://github.com/ImageMagick/ImageMagick/commit/93d029b70ac766ce0b5d7261a2dd334535f48038
Comment 1 Laura Pardo 2018-05-22 18:46:14 EDT
Created ImageMagick tracking bugs for this issue:

Affects: fedora-all [bug 1581487]
Comment 3 Pedro Yóssis Silva Barbosa 2018-06-05 00:16:11 EDT
The ReadOneMNGImage function is included in recent versions of ImageMagick only.
Comment 4 Pedro Yóssis Silva Barbosa 2018-06-05 00:16:19 EDT
Statement:

This issue did not affect the versions of ImageMagick as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Note You need to log in before you can comment on or make changes to this bug.