GHSA-gv85-xg33-553c: Duplicate Advisory: ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-j96m-mjp6-99xr. This link is maintained to preserve external references.
Original Description
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in “/tmp,” resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
References
- bugzilla.redhat.com/show_bug.cgi?id=2176858
- github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
- github.com/advisories/GHSA-gv85-xg33-553c
- lists.debian.org/debian-lts-announce/2024/02/msg00007.html
- nvd.nist.gov/vuln/detail/CVE-2023-1289
Code Behaviors & Features
Detect and mitigate GHSA-gv85-xg33-553c with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →