CVE-2017-14172Excessive Iteration in Imagemagick

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 31.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7
Latest updateMay 13

Description

In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/imagemagick< imagemagick 8:6.9.9.34+dfsg-3 (bookworm)
Debianimagemagick/imagemagick< 8:6.9.9.34+dfsg-3+3

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.10, 18.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hvh3-xpr5-c2c8: In coders/ps2022-05-13
OSV
CVE-2017-14172: In coders/ps2017-09-07

📋Vendor Advisories

3
Ubuntu
ImageMagick vulnerabilities2018-06-12
Red Hat
ImageMagick: Lack of an EOF check in ReadPSImage() function2017-09-07
Debian
CVE-2017-14172: imagemagick - In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of...2017

💬Community

2
Bugzilla
CVE-2017-14172 ImageMagick: Lack of an EOF check in ReadPSImage() function2017-09-08
Bugzilla
CVE-2017-14060 CVE-2017-14172 CVE-2017-14173 CVE-2017-14174 CVE-2017-14175 CVE-2017-14224 CVE-2017-14248 CVE-2017-14249 CVE-2017-14324 CVE-2017-14325 CVE-2017-14326 CVE-2017-14400 ImageMagick: various2017-09-06