Use After Free The advisory has been revoked - it doesn't affect any version of package ImageMagick Open this link in a new tab
Threat Intelligence
EPSS
0.06% (27th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-IMAGEMAGICK-5702167
- published 12 Jun 2023
- disclosed 1 Jun 2023
Introduced: 1 Jun 2023
CVE-2023-34475 Open this link in a new tabAmendment
The Red Hat
security team deemed this advisory irrelevant for RHEL:6
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ImageMagick
package and not the ImageMagick
package as distributed by RHEL
.
A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
References
- https://access.redhat.com/security/cve/CVE-2023-34475
- https://bugzilla.redhat.com/show_bug.cgi?id=2214149
- https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/