fkie_cve-2013-4589
Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2024-11-21 01:55
Severity ?
Summary
The ExportAlphaQuantumType function in export.c in GraphicsMagick before 1.3.18 might allow remote attackers to cause a denial of service (crash) via vectors related to exporting the alpha of an 8-bit RGBA image.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.htmlThird Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/55288Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/55721Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201311-10.xmlThird Party Advisory
secalert@redhat.comhttp://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/Exploit, Patch
secalert@redhat.comhttp://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/Exploit, Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2013/11/15/14
secalert@redhat.comhttp://www.securityfocus.com/bid/63002Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1019085Issue Tracking
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55288Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55721Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201311-10.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/11/15/14
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/63002Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1019085Issue Tracking
Impacted products
Vendor Product Version
novell suse_linux_enterprise_software_development_kit 11.0
novell suse_studio_onsite 1.3
novell suse_linux_enterprise_debuginfo 11
graphicsmagick graphicsmagick *
graphicsmagick graphicsmagick 1.0
graphicsmagick graphicsmagick 1.0.1
graphicsmagick graphicsmagick 1.0.2
graphicsmagick graphicsmagick 1.0.3
graphicsmagick graphicsmagick 1.0.4
graphicsmagick graphicsmagick 1.0.5
graphicsmagick graphicsmagick 1.0.6
graphicsmagick graphicsmagick 1.1
graphicsmagick graphicsmagick 1.1.1
graphicsmagick graphicsmagick 1.1.2
graphicsmagick graphicsmagick 1.1.3
graphicsmagick graphicsmagick 1.1.4
graphicsmagick graphicsmagick 1.1.5
graphicsmagick graphicsmagick 1.1.6
graphicsmagick graphicsmagick 1.1.7
graphicsmagick graphicsmagick 1.1.8
graphicsmagick graphicsmagick 1.1.9
graphicsmagick graphicsmagick 1.1.10
graphicsmagick graphicsmagick 1.1.11
graphicsmagick graphicsmagick 1.1.12
graphicsmagick graphicsmagick 1.1.13
graphicsmagick graphicsmagick 1.1.14
graphicsmagick graphicsmagick 1.2.1
graphicsmagick graphicsmagick 1.2.2
graphicsmagick graphicsmagick 1.2.3
graphicsmagick graphicsmagick 1.2.4
graphicsmagick graphicsmagick 1.2.5
graphicsmagick graphicsmagick 1.2.6
graphicsmagick graphicsmagick 1.2.7
graphicsmagick graphicsmagick 1.2.18
graphicsmagick graphicsmagick 1.3.8
graphicsmagick graphicsmagick 1.3.9
graphicsmagick graphicsmagick 1.3.10
graphicsmagick graphicsmagick 1.3.11
graphicsmagick graphicsmagick 1.3.12
graphicsmagick graphicsmagick 1.3.13
graphicsmagick graphicsmagick 1.3.14
graphicsmagick graphicsmagick 1.3.15
graphicsmagick graphicsmagick 1.3.16
fedoraproject fedora 18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:suse_studio_onsite:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B60F57B-E96F-45A6-9BF7-0C33C9654D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "B942E0F5-7FDC-4AE5-985D-25F4EA7406F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "999B6EE4-DCDB-4C23-B9E0-F8A62542DB69",
              "versionEndIncluding": "1.3.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3834A3-8A7E-4914-A20C-EE694150D044",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E54C88D-035D-43F7-8D26-F07C9DC24D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDB13AA-2AD3-4FFE-9851-53BB0531BC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "071499F5-8FB0-4EE9-B816-6514AF6C17AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96A991C-67A7-4C36-99C4-846BD2175F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC0F79E-4DD6-4EF9-82E1-68DC8EB7EF5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7E2792-B4BC-4C71-990D-0B7462919568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10F2FD22-4058-45D6-8352-0AA6382746C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F41DBD-6F06-40DC-A722-EC51B9ACC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96CA70E0-2533-417A-B8C4-F687BF256691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF103AE-6F15-4F2D-A375-F2AF91171EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65929D5C-31B1-4A70-8E9C-AC6749332480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC45DB14-ABB2-4116-930D-349A81CDB982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0573F148-0204-4F6B-A7B7-12DDF61C7383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D259740-FE5A-4D28-B554-FD176F9BD1FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "489040F9-1992-4030-9AFC-9855CFB8C1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9942F4B-6608-4828-988C-2F76EB73CC48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D4C9D5-2A4F-4263-943C-1F46E0BB802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAA39999-2648-4EBB-A9CD-15FBE9900E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD2742D-41F6-43F4-B90B-B75D54E08326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2755909D-D83F-4810-824D-7514EE501AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5763F6B5-C4FB-4792-B5D8-058B314D177E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E41E1B-BE16-4581-A503-CEC993D11A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3C34D3-56B0-4539-8361-4EEBBD878777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "633AB711-AC54-40B3-8159-2519DDAD1574",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0959A09D-C929-466B-B1BB-4474D7D1907F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51A929D-59F1-4C55-A9E4-A3665FD3871D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9256D4B-BD2E-4A5B-92BA-BB393B03488B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "08755609-AF7B-43A4-830E-B129FBF48C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C656F3BD-3FB8-484C-8853-853C47BDFCE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4091A1BC-FCC5-4AF2-94D3-0591AB64B4E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB960C2-ED27-45D5-A1A3-F678B94ADFAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B53B3B-DB25-4705-97B2-95EE79D3E0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4349B6B5-0CCB-49ED-BF15-AE1D372FA600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "42851FA8-A67B-4982-933F-6EDB4A22FBB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB4422CF-1804-461C-BFC8-2B70B0AEF330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A41BF3B-704E-4A33-B84A-8C7D956F397B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A29D964-F222-44AB-86B8-1B869E0EB658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B444C6-CF39-4F78-8FDC-5ED17440D566",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ExportAlphaQuantumType function in export.c in GraphicsMagick before 1.3.18 might allow remote attackers to cause a denial of service (crash) via vectors related to exporting the alpha of an 8-bit RGBA image."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ExportAlphaQuantumType en export.c de GraphicsMagick anterior a la versi\u00f3n 1.3.18 podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores relacionados con la exportaci\u00f3n de alpha de una imagen RGBA de 8-bit."
    }
  ],
  "id": "CVE-2013-4589",
  "lastModified": "2024-11-21T01:55:53.233",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-11-23T11:55:04.773",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55288"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55721"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201311-10.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63002"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201311-10.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/15/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019085"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.