ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
References
Link | Resource |
---|---|
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f | Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/issues/4988 | Exploit Issue Tracking Third Party Advisory |
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html |
Configurations
History
No history.
Information
Published : 2022-05-08 23:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-28463
Mitre link : CVE-2022-28463
CVE.ORG link : CVE-2022-28463
JSON object : View
Products Affected
debian
- debian_linux
imagemagick
- imagemagick
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')