跳转到帖子

Amazon Linux 2023: CVE-2022-44267: Medium priority package update for ImageMagick

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2022-44267: Medium priority package update for ImageMagick

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
02/06/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

ImageMagick 7.1.0-49 is vulnerable to Denial of Service. When it parses a PNG image (e.g., for resize), the convert process could be left waiting for stdin input. A vulnerability was found in ImageMagick that is triggered when the software parses a PNG image containing a single dash (-) in the filename. To remotely exploit this bug, an attacker can upload a malicious PNG with a text chunk that adds a single dash in the name to any site using ImageMagick. The site would then parse the image, and ImageMagick would interpret the text string as the filename, loading the content as a raw profile. If this text string contains a single dash, the program would then try to read content from the standard input, potentially leaving the conversion process waiting infinitely, causing a denial of service.

Solution(s)

  • amazon-linux-2023-upgrade-imagemagick
  • amazon-linux-2023-upgrade-imagemagick-c
  • amazon-linux-2023-upgrade-imagemagick-c-debuginfo
  • amazon-linux-2023-upgrade-imagemagick-c-devel
  • amazon-linux-2023-upgrade-imagemagick-debuginfo
  • amazon-linux-2023-upgrade-imagemagick-debugsource
  • amazon-linux-2023-upgrade-imagemagick-devel
  • amazon-linux-2023-upgrade-imagemagick-doc
  • amazon-linux-2023-upgrade-imagemagick-libs
  • amazon-linux-2023-upgrade-imagemagick-libs-debuginfo
  • amazon-linux-2023-upgrade-imagemagick-perl
  • amazon-linux-2023-upgrade-imagemagick-perl-debuginfo

References

  • https://attackerkb.com/topics/cve-2022-44267
  • CVE - 2022-44267
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-121.html
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…