Description
In GraphicsMagick 1.4 snapshot-20181209 Q8 on 32-bit platforms, there is a heap-based buffer over-read in the ReadBMPImage function of bmp.c, which allows attackers to cause a denial of service via a crafted bmp image file. This only affects GraphicsMagick installations with customized BMP limits.
References (6)
Core 6
Core References
Patch, Vendor Advisory x_refsource_misc
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/648e3977a293
Exploit, Third Party Advisory x_refsource_misc
https://sourceforge.net/p/graphicsmagick/bugs/582/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106229
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/12/msg00018.html
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4207-1/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4640
Scores
CVSS v3
5.3
EPSS
0.0085
EPSS Percentile
74.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (5)
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
graphicsmagick/graphicsmagick
1.4 2018-12-09
Published
Dec 17, 2018
Tracked Since
Feb 18, 2026