安全公告/【CVE-2023-1289】
基本信息
漏洞描述
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
修复方式
yum update PackageName
漏洞判定
执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
参考
https://gitee.com/src-openeuler/ImageMagick/issues/I6LKHN
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1289
https://nvd.nist.gov/vuln/detail/CVE-2023-1289