Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 14 Jun 2023 07:52:05 -0500 (CDT)
From: Bob Friesenhahn <>
Subject: Re: Stack overflow in imagemagick coders/tiff.c

On Wed, 14 Jun 2023, Salvatore Bonaccorso wrote:

> Hi
> On Mon, May 29, 2023 at 08:11:18AM +0000, Bastien Roucari├Ęs wrote:
>> Hi,
>> Reading changelog and code of imagemagick, I want to report a stack overflow with crafted tiff file in imagemagick
>> Fixed (after 6.9.12-26) by:
> CVE-2023-3195 has been assigned for this issue according to
> (not yet on
> feed itself).

It seems suspicious that (after looking at the code) this is obviously 
a heap overflow (of the 'tile_pixels' allocation) rather than a stack 
overflow.  Whenever something is mischaracterized, it becomes suspect.

The overflow checking while computing 'extent' still seems suspect and 
is worthy of more inspection, especially on 32-bit systems.

The development ImageMagick 7.1 is included in oss-fuzz testing (but 
has not successfully compiled since May 22nd).  Oss-fuzz has 
discovered 2935 serious issues related to development ImageMagick 7 
since 2017, and most of those have been fixed in ImageMagick 7, but 
not in legacy ImageMagick 6.

Linux/OSS distributions still distributing ImageMagick 6 are severely 
fooling themselves and their users if it is believed that the software 
can be made secure by applying a few patches.

Bob Friesenhahn,
GraphicsMagick Maintainer,
Public Key,

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.