Description
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3737-1 | imagemagick security update |
Debian DSA |
DSA-5628-1 | imagemagick security update |
Github GHSA |
GHSA-j96m-mjp6-99xr | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS |
Ubuntu USN |
USN-6200-1 | ImageMagick vulnerabilities |
Ubuntu USN |
USN-6200-2 | ImageMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T05:40:59.961Z
Reserved: 2023-03-09T00:00:00.000Z
Link: CVE-2023-1289
No data.
Status : Modified
Published: 2023-03-23T20:15:14.393
Modified: 2024-11-21T07:38:50.907
Link: CVE-2023-1289
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN