Skip to content

Commit bb86ec5

Browse files
1 parent 5f1ef93 commit bb86ec5

3 files changed

Lines changed: 544 additions & 48 deletions

File tree

Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gv85-xg33-553c",
4+
"modified": "2026-03-12T20:29:55Z",
5+
"published": "2023-03-23T21:30:20Z",
6+
"withdrawn": "2026-03-12T20:29:55Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in \"/tmp\", possible to leverage DoS",
9+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-j96m-mjp6-99xr. This link is maintained to preserve external references.\n\n### Original Description\nA vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in \"/tmp,\" resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
14+
}
15+
],
16+
"affected": [
17+
{
18+
"package": {
19+
"ecosystem": "NuGet",
20+
"name": "Magick.NET-Q16-AnyCPU"
21+
},
22+
"ranges": [
23+
{
24+
"type": "ECOSYSTEM",
25+
"events": [
26+
{
27+
"introduced": "0"
28+
},
29+
{
30+
"fixed": "13.0.0"
31+
}
32+
]
33+
}
34+
],
35+
"database_specific": {
36+
"last_known_affected_version_range": "<= 12.3.0"
37+
}
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr"
44+
},
45+
{
46+
"type": "ADVISORY",
47+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1289"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176858"
56+
},
57+
{
58+
"type": "WEB",
59+
"url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html"
60+
}
61+
],
62+
"database_specific": {
63+
"cwe_ids": [
64+
"CWE-20"
65+
],
66+
"severity": "MODERATE",
67+
"github_reviewed": true,
68+
"github_reviewed_at": "2026-03-12T20:29:55Z",
69+
"nvd_published_at": "2023-03-23T20:15:00Z"
70+
}
71+
}

0 commit comments

Comments
 (0)