CVE-2017-14103

EUVD-2017-5615
The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
graphicsmagickgraphicsmagick
1.3.26
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
graphicsmagick
bookworm
1.4+really1.3.40-4
fixed
bullseye
1.4+really1.3.36+hg16481-2+deb11u1
fixed
bullseye (security)
1.4+really1.3.36+hg16481-2+deb11u1
fixed
jessie
not-affected
sid
1.4+really1.3.45-1
fixed
stretch
not-affected
trixie
1.4+really1.3.45-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
graphicsmagick
artful
ignored
bionic
not-affected
cosmic
not-affected
trusty
not-affected
xenial
not-affected
zesty
ignored