A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Extra Packages For Enterprise Linux Subscribe
Imagemagick Subscribe
Imagemagick Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3737-1 imagemagick security update
Debian DSA Debian DSA DSA-5628-1 imagemagick security update
Ubuntu USN Ubuntu USN USN-6200-1 ImageMagick vulnerabilities
Ubuntu USN Ubuntu USN USN-6200-2 ImageMagick vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T05:40:59.961Z

Reserved: 2023-03-09T00:00:00

Link: CVE-2023-1289

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-03-23T20:15:14.393

Modified: 2024-11-21T07:38:50.907

Link: CVE-2023-1289

cve-icon Redhat

Severity : Low

Publid Date: 2023-03-09T00:00:00Z

Links: CVE-2023-1289 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses