Description
In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1619-1 | graphicsmagick security update |
Debian DSA |
DSA-4640-1 | graphicsmagick security update |
EUVD |
EUVD-2018-12751 | In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification. |
Ubuntu USN |
USN-4207-1 | GraphicsMagick vulnerabilities |
Ubuntu USN |
USN-5974-1 | GraphicsMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:58:18.499Z
Reserved: 2018-12-17T00:00:00.000Z
Link: CVE-2018-20184
No data.
Status : Modified
Published: 2018-12-17T19:29:03.173
Modified: 2024-11-21T04:01:02.417
Link: CVE-2018-20184
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN