CVE-2017-5507

Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
References
Link Resource
http://www.debian.org/security/2017/dsa-3799 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/16/6 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/17/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/95752 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 Issue Tracking Patch Third Party Advisory
https://github.com/ImageMagick/ImageMagick/blob/6.9.7-4/ChangeLog Release Notes Third Party Advisory
https://github.com/ImageMagick/ImageMagick/blob/7.0.4-4/ChangeLog Release Notes Third Party Advisory
https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 Patch Vendor Advisory
https://security.gentoo.org/glsa/201702-09 Third Party Advisory
http://www.debian.org/security/2017/dsa-3799 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/16/6 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/17/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/95752 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 Issue Tracking Patch Third Party Advisory
https://github.com/ImageMagick/ImageMagick/blob/6.9.7-4/ChangeLog Release Notes Third Party Advisory
https://github.com/ImageMagick/ImageMagick/blob/7.0.4-4/ChangeLog Release Notes Third Party Advisory
https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 Patch Vendor Advisory
https://security.gentoo.org/glsa/201702-09 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-9:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-10:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-9:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.2-10:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-9:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.3-10:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.4-0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.4-1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.4-2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.4-3:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3799 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3799 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/01/16/6 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/01/16/6 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/01/17/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/01/17/5 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/95752 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95752 - Third Party Advisory, VDB Entry
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 - Issue Tracking, Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851382 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/ImageMagick/ImageMagick/blob/6.9.7-4/ChangeLog - Release Notes, Third Party Advisory () https://github.com/ImageMagick/ImageMagick/blob/6.9.7-4/ChangeLog - Release Notes, Third Party Advisory
References () https://github.com/ImageMagick/ImageMagick/blob/7.0.4-4/ChangeLog - Release Notes, Third Party Advisory () https://github.com/ImageMagick/ImageMagick/blob/7.0.4-4/ChangeLog - Release Notes, Third Party Advisory
References () https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 - Patch, Vendor Advisory () https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 - Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/201702-09 - Third Party Advisory () https://security.gentoo.org/glsa/201702-09 - Third Party Advisory

Information

Published : 2017-03-24 15:59

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5507

Mitre link : CVE-2017-5507

CVE.ORG link : CVE-2017-5507


JSON object : View

Products Affected

debian

  • debian_linux

imagemagick

  • imagemagick
CWE
CWE-772

Missing Release of Resource after Effective Lifetime