Description
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
References (4)
Core 4
Core References
Issue Tracking, Patch
https://bugzilla.redhat.com/show_bug.cgi?id=2176858
Exploit, Vendor Advisory
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html
Scores
CVSS v3
5.5
EPSS
0.0010
EPSS Percentile
27.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-20
Status
published
Products (26)
fedoraproject/extra_packages_for_enterprise_linux
8.0
fedoraproject/extra_packages_for_enterprise_linux
9.0
fedoraproject/fedora
36
fedoraproject/fedora
37
imagemagick/imagemagick
< 7.1.1-0
nuget/Magick.NET-Q16-AnyCPU
0 - 13.0.0NuGet
nuget/Magick.NET-Q16-arm64
0 - 13.0.0NuGet
nuget/Magick.NET-Q16-HDRI-AnyCPU
0 - 13.0.0NuGet
nuget/Magick.NET-Q16-HDRI-arm64
0 - 13.0.0NuGet
nuget/Magick.NET-Q16-HDRI-OpenMP-arm64
0 - 13.0.0NuGet
... and 16 more
Published
Mar 23, 2023
Tracked Since
Feb 18, 2026