ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
References
Configurations
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f - Patch, Third Party Advisory | |
References | () https://github.com/ImageMagick/ImageMagick/issues/4988 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html - |
22 May 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-05-08 23:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28463
Mitre link : CVE-2022-28463
CVE.ORG link : CVE-2022-28463
JSON object : View
Products Affected
debian
- debian_linux
imagemagick
- imagemagick
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')