Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
| Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
| Hyperlink | Source | Resource |
|---|---|---|
| http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html | secalert@redhat.com | Mailing List Third Party Advisory |
| http://secunia.com/advisories/47926 | secalert@redhat.com | Broken Link |
| http://secunia.com/advisories/48974 | secalert@redhat.com | Broken Link |
| http://secunia.com/advisories/49043 | secalert@redhat.com | Broken Link |
| http://secunia.com/advisories/49317 | secalert@redhat.com | Broken Link |
| http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c | secalert@redhat.com | Broken Link |
| http://ubuntu.com/usn/usn-1435-1 | secalert@redhat.com | Third Party Advisory |
| http://www.debian.org/security/2012/dsa-2462 | secalert@redhat.com | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2012/03/19/5 | secalert@redhat.com | Mailing List Patch Third Party Advisory |
| http://www.osvdb.org/80555 | secalert@redhat.com | Broken Link |
| http://www.securityfocus.com/bid/51957 | secalert@redhat.com | Patch Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 | secalert@redhat.com | Issue Tracking Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 | secalert@redhat.com | Third Party Advisory VDB Entry |
| http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
| http://secunia.com/advisories/47926 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://secunia.com/advisories/48974 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://secunia.com/advisories/49043 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://secunia.com/advisories/49317 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://ubuntu.com/usn/usn-1435-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| http://www.debian.org/security/2012/dsa-2462 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2012/03/19/5 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Patch Third Party Advisory |
| http://www.osvdb.org/80555 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://www.securityfocus.com/bid/51957 | af854a3a-2127-422b-91ae-364da2661108 | Patch Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/76139 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |