Vulnerability Details : CVE-2014-1958
Buffer overflow in the DecodePSDPixels function in coders/psd.c in ImageMagick before 6.8.8-5 might allow remote attackers to execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-2030.
Vulnerability category: OverflowExecute code
Products affected by CVE-2014-1958
- cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1958
1.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1958
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2014-1958
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1958
-
https://www.openwall.com/lists/oss-security/2014/02/19/13
oss-security - Re: information on "ImageMagick PSD Images Processing RLE Decoding Buffer Overflow Vulnerability"Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/02/13/2
oss-security - Re: information on "ImageMagick PSD Images Processing RLE Decoding Buffer Overflow Vulnerability"Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-03/msg00032.html
openSUSE-SU-2014:0362-1: moderate: ImageMagick: fixed buffer overflow in PSD image handling - openSUSE Updates - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://ubuntu.com/usn/usn-2132-1
USN-2132-1: ImageMagick vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/02/13/5
oss-security - Re: information on "ImageMagick PSD Images Processing RLE Decoding Buffer Overflow Vulnerability"Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-03/msg00039.html
openSUSE-SU-2014:0369-1: moderate: ImageMagick: fixed buffer overflow in PSD image handling - openSUSE Updates - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://trac.imagemagick.org/changeset/14801
404 Not FoundBroken Link
Jump to