CVE-2017-13139 - Out-of-bounds Read

Severity

75%

Complexity

99%

Confidentiality

106%

In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.

In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.

CVSS 3.0 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 7 years ago

2017-08-23 06:29:00

Last updated 6 years ago

2018-06-14 01:29:00

Affected Software

ImageMagick

ImageMagick 7.0.0-0

7.0.0-0

ImageMagick 7.0.1-0

7.0.1-0

ImageMagick 7.0.1-1

7.0.1-1

ImageMagick 7.0.1-2

7.0.1-2

ImageMagick 7.0.1-3

7.0.1-3

ImageMagick 7.0.1-4

7.0.1-4

ImageMagick 7.0.1-5

7.0.1-5

ImageMagick 7.0.1-6

7.0.1-6

ImageMagick 7.0.1-7

7.0.1-7

ImageMagick 7.0.1-8

7.0.1-8

ImageMagick 7.0.1-9

7.0.1-9

ImageMagick 7.0.1-10

7.0.1-10

ImageMagick 7.0.2-0

7.0.2-0

ImageMagick 7.0.2-1

7.0.2-1

ImageMagick 7.0.2-2

7.0.2-2

ImageMagick 7.0.2-3

7.0.2-3

ImageMagick 7.0.2-4

7.0.2-4

ImageMagick 7.0.2-5

7.0.2-5

ImageMagick 7.0.2-6

7.0.2-6

ImageMagick 7.0.2-7

7.0.2-7

ImageMagick 7.0.2-8

7.0.2-8

ImageMagick 7.0.2-9

7.0.2-9

ImageMagick 7.0.2-10

7.0.2-10

ImageMagick 7.0.3-0

7.0.3-0

ImageMagick 7.0.3-1

7.0.3-1

ImageMagick 7.0.3-2

7.0.3-2

ImageMagick 7.0.3-3

7.0.3-3

ImageMagick 7.0.3-4

7.0.3-4

ImageMagick 7.0.3-5

7.0.3-5

ImageMagick 7.0.3-6

7.0.3-6

ImageMagick 7.0.3-7

7.0.3-7

ImageMagick 7.0.3-8

7.0.3-8

ImageMagick 7.0.3-9

7.0.3-9

ImageMagick 7.0.3-10

7.0.3-10

ImageMagick 7.0.4-0

7.0.4-0

ImageMagick 7.0.4-1

7.0.4-1

ImageMagick 7.0.4-2

7.0.4-2

ImageMagick 7.0.4-3

7.0.4-3

ImageMagick 7.0.4-4

7.0.4-4

ImageMagick 7.0.4-5

7.0.4-5

ImageMagick 7.0.4-6

7.0.4-6

ImageMagick 7.0.4-7

7.0.4-7

ImageMagick 7.0.4-8

7.0.4-8

ImageMagick 7.0.4-9

7.0.4-9

ImageMagick 7.0.4-10

7.0.4-10

ImageMagick 7.0.5-0

7.0.5-0

ImageMagick 7.0.5-1

7.0.5-1

ImageMagick 7.0.5-2

7.0.5-2

ImageMagick 7.0.5-3

7.0.5-3

ImageMagick 7.0.5-4

7.0.5-4

ImageMagick 7.0.5-5

7.0.5-5

ImageMagick 7.0.5-6

7.0.5-6

ImageMagick 7.0.5-7

7.0.5-7

ImageMagick 7.0.5-8

7.0.5-8

ImageMagick 7.0.5-10

7.0.5-10

ImageMagick 7.0.6-0

7.0.6-0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.