CVE-2023-1289
23.03.2023, 20:15
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.Enginsight
Vendor | Product | Version |
---|---|---|
imagemagick | imagemagick | 𝑥 < 7.1.1-0 |
fedoraproject | extra_packages_for_enterprise_linux | 8.0 |
fedoraproject | extra_packages_for_enterprise_linux | 9.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
imagemagick |
|
Common Weakness Enumeration
References