Vulnerability Details : CVE-2014-9825
Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.
Vulnerability category: Overflow
Products affected by CVE-2014-9825
- cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9825
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9825
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2014-9825
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9825
-
http://www.openwall.com/lists/oss-security/2014/12/24/1
oss-security - Imagemagick fuzzing bugMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1343481
1343481 – (CVE-2014-9825) CVE-2014-9825 ImageMagick: heap overflow in corrupted psd fileIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/02/13
oss-security - Re: ImageMagick CVEsMailing List;Third Party Advisory
-
https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=69490f5cffbda612e15a2985699455bb0b45e276
404 Not FoundPatch;Third Party Advisory
Jump to