Vulnerability Details : CVE-2014-9811
The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2014-9811
- cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9811
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9811
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-10-31 |
CWE ids for CVE-2014-9811
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9811
-
https://bugzilla.redhat.com/show_bug.cgi?id=1343467
1343467 – (CVE-2014-9811) CVE-2014-9811 ImageMagick: crash in xwd file handlerIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/12/24/1
oss-security - Imagemagick fuzzing bugMailing List;Third Party Advisory
-
https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=82a5bbdd47b9b3f43ce3c2aa18741aecc4a0f962
404 Not FoundPatch;Third Party Advisory
-
https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=914da276f717b3e21e5af6614887af14af87a9b8
404 Not FoundPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/02/13
oss-security - Re: ImageMagick CVEsMailing List;Patch;Third Party Advisory
Jump to