Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2020-25667: ImageMagick: heap-based buffer overflow in TIFFGetProfiles | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Alexandros Toptsoglou <atoptsoglou> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/272323/ | ||
Whiteboard: | |||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Alexandros Toptsoglou
2020-11-25 16:08:34 UTC
Seems that the issue was introduced in 7.0.8-63[1] and 6.9.10-63 [2]. based on this none of our codestream is affected. Unfortunately the POC is not available to cross check. It would be beneficial if you Petr could also confirm. [1]https://github.com/ImageMagick/ImageMagick/commit/77ad22e52c79102b2258ec9fcd6d86901da280ca [2] https://github.com/ImageMagick/ImageMagick6/commit/9246c8b7cbc8bef737bb0ad63c3e6f51cfaad6c0 Yes. If I get that correctly, profile is not guaranteed to be a null terminated string and strstr() goes beyond it. Closing as fixed (in Factory). |