CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-7447 Amazon Linux Security Advisory for GraphicsMagick: ALAS-2016-752

2016年10月15日 1888点热度 0人点赞 0条评论

漏洞类别:Amazon Linux

漏洞等级:

漏洞信息

A possible heap overflow was discovered in the EscapeParenthesis() function (CVE-2016-7447 ).

Various issues were found in the processing of SVG files in GraphicsMagick (CVE-2016-7446 ).

The TIFF reader had a bug pertaining to use of TIFFGetField() when a 'count' value is returned. The bug caused a heap read overflow (due to using strlcpy() to copy a possibly unterminated string) which could allow an untrusted file to crash the software (CVE-2016-7449 ).

The Utah RLE reader did not validate that header information was reasonable given the file size and so it could cause huge memory allocations and/or consume huge amounts of CPU, causing a denial of service (CVE-2016-7448 )

漏洞危害

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

解决方案

Please refer to Amazon advisory ALAS-2016-752 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on noarch)

ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on x86_64)

ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on src)

ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on i686)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me