CVE-2017-14175

Priority
Low
Description
In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to
lack of an EOF (End of File) check might cause huge CPU consumption. When a
crafted XBM file, which claims large rows and columns fields in the header
but does not contain sufficient backing data, is provided, the loop over
the rows would consume huge CPU resources, since there is no EOF check
inside the loop.
References
Bugs
Notes
 mdeslaur> 0314-CVE-2017-14175-Fix-DoS-missing-EOF-check-in-ReadXBMImage-1-of-2.patch and
 mdeslaur> 0315-CVE-2017-14175-Fix-DoS-missing-EOF-check-in-ReadXBMImage-2-of-2.patch in wheezy
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 17.04 (Zesty Zapus):ignored (reached end-of-life)
Ubuntu 17.10 (Artful Aardvark):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Patches:
Upstream:https://github.com/ImageMagick/ImageMagick/commit/b8c63b156bf26b52e710b1a0643c846a6cd01e56
Upstream:https://github.com/ImageMagick/ImageMagick/commit/169a20e13ee634aba7ebab94775497d6a89f5ec1
More Information

Updated: 2018-01-15 13:25:36 UTC (commit 14005)