A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
{ "vanir_signatures": [ { "signature_type": "Function", "target": { "function": "ReadTIFFImage", "file": "coders/tiff.c" }, "digest": { "function_hash": "148769445397280588461867256646424347782", "length": 22362.0 }, "id": "CVE-2023-3745-0fc8b379", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick/commit/54cdc146bbe50018526770be201b56643ad58ba7" }, { "signature_type": "Function", "target": { "function": "ReadTIFFImage", "file": "coders/tiff.c" }, "digest": { "function_hash": "280077603883983449602804815327969271080", "length": 22406.0 }, "id": "CVE-2023-3745-3691a2d6", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick/commit/651672f19c75161a6159d9b6838fd3095b6c5304" }, { "signature_type": "Line", "target": { "file": "coders/tiff.c" }, "digest": { "line_hashes": [ "129575627178515815325741093493251190489", "181544294095345802565870614676011298339", "164215297617223026395716653487651170959", "251454235028671124042236441957587586424", "232192484066260492618245841682257617122", "183138322953951099720810700417921294079", "100517629411598991239095207334309534843", "23811094227217603236953172319967586336", "305569056091343756016595704207853994615" ], "threshold": 0.9 }, "id": "CVE-2023-3745-56e520bd", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick6/commit/7486477aa00c5c7856b111506da075b6cdfa8b73" }, { "signature_type": "Function", "target": { "function": "ReadTIFFImage", "file": "coders/tiff.c" }, "digest": { "function_hash": "150452053484788551458709260928417487066", "length": 22168.0 }, "id": "CVE-2023-3745-c37c045e", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick6/commit/7486477aa00c5c7856b111506da075b6cdfa8b73" }, { "signature_type": "Line", "target": { "file": "coders/tiff.c" }, "digest": { "line_hashes": [ "118824816895528287798113084228650057011", "330836052793523869897681511012797318436", "68125290772832173454986644648354935781", "61239350792466514650104050197438222833", "232192484066260492618245841682257617122", "183138322953951099720810700417921294079", "100517629411598991239095207334309534843", "23811094227217603236953172319967586336", "305569056091343756016595704207853994615" ], "threshold": 0.9 }, "id": "CVE-2023-3745-d6ea5ce0", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick/commit/651672f19c75161a6159d9b6838fd3095b6c5304" }, { "signature_type": "Function", "target": { "function": "ReadTIFFImage", "file": "coders/tiff.c" }, "digest": { "function_hash": "201658892558676292037072503713412344059", "length": 22124.0 }, "id": "CVE-2023-3745-e356b37a", "signature_version": "v1", "deprecated": false, "source": "https://github.com/imagemagick/imagemagick6/commit/b466a96965afc1308a4ace93f5535c2b770f294b" } ] }