CVE-2017-14528

The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2730 Exploit Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/100875 Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html Mailing List Third Party Advisory
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32560 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:imagemagick:imagemagick:7.0.6:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-09-18 00:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-14528

Mitre link : CVE-2017-14528

CVE.ORG link : CVE-2017-14528


JSON object : View

Products Affected

debian

  • debian_linux

imagemagick

  • imagemagick
CWE
CWE-416

Use After Free