#VU77938 Buffer overflow in ImageMagick - CVE-2023-3428


Vulnerability identifier: #VU77938

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3428

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ImageMagick
Client/Desktop applications / Multimedia software

Vendor: ImageMagick.org

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing TIFF files in coders/tiff.c. A remote attacker can pass a specially crafted TIFF file to the application, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

ImageMagick: 6.9.0-0 - 6.9.0-10, 6.9.1-0 - 6.9.12-90, 6.9.2-0 - 6.9.2-10, 6.9.3-0 - 6.9.3-10, 6.9.4-0 - 6.9.4-10, 6.9.5-0 - 6.9.5-10, 6.9.6-0 - 6.9.6-8, 6.9.7 - 6.9.7-10, 6.9.8-0 - 6.9.8-10, 6.9.9-0 - 6.9.9-51, 7.0.0-0, 7.0.1-0 - 7.0.11-14, 7.0.2-0 - 7.0.2-10, 7.0.3-0 - 7.0.3-10, 7.0.4-0 - 7.0.4-10, 7.0.5-0 - 7.0.5-10, 7.0.6 - 7.0.6-10, 7.0.7 - 7.0.7-39, 7.0.8-0 - 7.0.8-69, 7.0.9 - 7.0.9-27, 7.1.0-0 - 7.1.0-62, 7.1.1-0, 7.1.1-1, 7.1.1-2, 7.1.1-3, 7.1.1-4, 7.1.1-5, 7.1.1-6, 7.1.1-7, 7.1.1-8, 7.1.1-9, 7.1.1-10, 7.1.1-11, 7.1.1-12, 7.6.0-0


External links
https://github.com/ImageMagick/ImageMagick/commit/a531d28e31309676ce8168c3b6dbbb5374b78790
https://github.com/ImageMagick/ImageMagick6/commit/0d00400727170b0540a355a1bc52787bc7bcdea5


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability