A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3737-1 | imagemagick security update |
Debian DSA |
DSA-5628-1 | imagemagick security update |
Ubuntu USN |
USN-6200-1 | ImageMagick vulnerabilities |
Ubuntu USN |
USN-6200-2 | ImageMagick vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T05:40:59.961Z
Reserved: 2023-03-09T00:00:00
Link: CVE-2023-1289
No data.
Status : Modified
Published: 2023-03-23T20:15:14.393
Modified: 2024-11-21T07:38:50.907
Link: CVE-2023-1289
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN