CVE-2012-1186

Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/47926 Broken Link
http://secunia.com/advisories/48974 Broken Link
http://secunia.com/advisories/49043 Broken Link
http://secunia.com/advisories/49317 Broken Link
http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c Broken Link
http://ubuntu.com/usn/usn-1435-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2462 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/03/19/5 Mailing List Patch Third Party Advisory
http://www.osvdb.org/80555 Broken Link
http://www.securityfocus.com/bid/51957 Patch Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/47926 Broken Link
http://secunia.com/advisories/48974 Broken Link
http://secunia.com/advisories/49043 Broken Link
http://secunia.com/advisories/49317 Broken Link
http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c Broken Link
http://ubuntu.com/usn/usn-1435-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2462 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/03/19/5 Mailing List Patch Third Party Advisory
http://www.osvdb.org/80555 Broken Link
http://www.securityfocus.com/bid/51957 Patch Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/47926 - Broken Link () http://secunia.com/advisories/47926 - Broken Link
References () http://secunia.com/advisories/48974 - Broken Link () http://secunia.com/advisories/48974 - Broken Link
References () http://secunia.com/advisories/49043 - Broken Link () http://secunia.com/advisories/49043 - Broken Link
References () http://secunia.com/advisories/49317 - Broken Link () http://secunia.com/advisories/49317 - Broken Link
References () http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c - Broken Link () http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c - Broken Link
References () http://ubuntu.com/usn/usn-1435-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1435-1 - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2462 - Third Party Advisory () http://www.debian.org/security/2012/dsa-2462 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2012/03/19/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/03/19/5 - Mailing List, Patch, Third Party Advisory
References () http://www.osvdb.org/80555 - Broken Link () http://www.osvdb.org/80555 - Broken Link
References () http://www.securityfocus.com/bid/51957 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/51957 - Patch, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 - Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 - Third Party Advisory, VDB Entry

07 Nov 2023, 02:10

Type Values Removed Values Added
Summary Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248. Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.

Information

Published : 2012-06-05 22:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1186

Mitre link : CVE-2012-1186

CVE.ORG link : CVE-2012-1186


JSON object : View

Products Affected

debian

  • debian_linux

imagemagick

  • imagemagick

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')