QID 355824

QID 355824: Amazon Linux Security Advisory for php54-pecl-imagick : ALAS-2023-1810

imagemagick 7.0.7-12 q16, a cpu exhaustion vulnerability was found in the function readddsinfo in coders/dds.c, which allows attackers to cause a denial of service. (
( CVE-2017-1000476) the readxwdimage function in coders\xwd.c in imagemagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an xwd file. (
( CVE-2017-11166) in imagemagick 7.0.6-6, a memory exhaustion vulnerability was found in the function readtiffimage, which allows attackers to cause a denial of service. (
( CVE-2017-12805) in imagemagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8bim, which allows attackers to cause a denial of service. (
( CVE-2017-12806) a memory leak vulnerability has been discovered in imagemagick in the readpcdimage function of coders/pcd.c file.
An attacker could use this flaw to cause a denial of service via a crafted file. (
( CVE-2017-18251) an issue was discovered in imagemagick 7.0.7.
The mogrifyimagelist function in magickwand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in replaceimageinlist) via a crafted file. (
( CVE-2017-18252) a memory leak vulnerability has been discovered in imagemagick in the writegifimage function of coders/gif.c file.
( CVE-2017-18254) in imagemagick 7.0.7-16 q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function readmiffimage in coders/miff.c, which allows attackers to cause a denial of service (cpu exhaustion) via a crafted miff image file. (
( CVE-2017-18273) an infinite loop has been found in the way imagemagick reads multiple-image network graphics (mng) data.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2023-1810 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2023-1810 amazon linux URL Logo alas.aws.amazon.com/ALAS-2023-1810.html