René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

152 lines
4.5 KiB
JSON

{
"id": "CVE-2017-15277",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-12T08:29:00.290",
"lastModified": "2018-10-18T10:29:13.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette."
},
{
"lang": "es",
"value": "ReadGIFImage en coders/gif.c en ImageMagick 7.0.6-1 y GraphicsMagick 1.3.26 deja sin inicializar la paleta cuando se procesa un archivo GIF que no tiene ni una paleta global ni una local. Si el producto afectado se utiliza como una librer\u00eda cargada en un proceso que opera en datos de inter\u00e9s, estos datos pueden filtrarse a veces mediante la paleta no inicializada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "4C227898-C6EC-41BE-A3AD-229FFD8B86D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*",
"matchCriteriaId": "72A6252A-35A7-4D74-AF0E-0A7B4B12B146"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ImageMagick/ImageMagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ImageMagick/ImageMagick/issues/592",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/neex/gifoeb",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html",
"source": "cve@mitre.org"
},
{
"url": "https://usn.ubuntu.com/3681-1/",
"source": "cve@mitre.org"
},
{
"url": "https://usn.ubuntu.com/4232-1/",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2017/dsa-4032",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2017/dsa-4040",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2018/dsa-4321",
"source": "cve@mitre.org"
}
]
}