Bug 2214148 (CVE-2023-34474) - CVE-2023-34474 ImageMagick: heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c
Summary: CVE-2023-34474 ImageMagick: heap-based buffer overflow in ReadTIM2ImageData()...
Keywords:
Status: NEW
Alias: CVE-2023-34474
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2214154 2214156 2214157
Blocks: 2211637
TreeView+ depends on / blocked
 
Reported: 2023-06-12 05:51 UTC by TEJ RATHI
Modified: 2023-07-18 08:17 UTC (History)
2 users (show)

Fixed In Version: ImageMagick 7.1.1-10
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow issue was found in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. This flaw allows a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error, and allowing an application to crash, resulting in a denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2023-06-12 05:51:45 UTC
A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.

https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0

Comment 2 TEJ RATHI 2023-06-12 05:58:36 UTC
Created ImageMagick tracking bugs for this issue:

Affects: epel-8 [bug 2214156]
Affects: fedora-37 [bug 2214154]
Affects: fedora-38 [bug 2214157]


Note You need to log in before you can comment on or make changes to this bug.