CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
76.1%
In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
Vendor | Product | Version | CPE |
---|---|---|---|
graphicsmagick | graphicsmagick | * | cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
debian | debian_linux | 9.0 | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
debian | debian_linux | 10.0 | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 18.04 | cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
opensuse | backports_sle | 15.0 | cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:* |
opensuse | leap | 15.0 | cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* |
opensuse | leap | 15.1 | cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
opensuse | leap | 42.3 | cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* |
hg.graphicsmagick.org/hg/GraphicsMagick/rev/85f5bdcd246a
lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html
lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html
www.securityfocus.com/bid/108063
lists.debian.org/debian-lts-announce/2019/05/msg00027.html
sourceforge.net/p/graphicsmagick/bugs/605/
usn.ubuntu.com/4207-1/
www.debian.org/security/2020/dsa-4640
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
76.1%