CVE-2021-3610
Published: 24 February 2022
A heap-based buffer overflow vulnerability was found in ImageMagick in versions prior to 7.0.11-14 in ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which can lead to a crash and segmentation fault.
Notes
Author | Note |
---|---|
alexmurray | Originally this was though to be an issue specific to IM7, but turns out it also applies to IM6 versions from 6.9.10.88. As such Ubuntu releases since jammy are likely affected. |
Priority
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Not vulnerable
(code not present)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not present)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Released
(8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2)
Available with Ubuntu Pro |
|
trusty |
Not vulnerable
(code not present)
|
|
kinetic |
Released
(8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5)
|
|
lunar |
Released
(8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1)
|
|
mantic |
Released
(8:6.9.11.60+dfsg-1.6ubuntu1)
|
|
Patches: upstream: https://github.com/ImageMagick/ImageMagick/commit/930ff0d1a9bc42925a7856e9ea53f5fc9f318bf3 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |