GraphicsMagick SVGStartElement Function Stack-Based Buffer Overflow Vulnerability [CVE-2019-11005]
CVE Number – CVE-2019-11005
A vulnerability in the SVGStartElement function of GraphicsMagick could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.The vulnerability is due to improper parsing of quoted font family values by the SVGStartElementfunction, as defined in the coders/svg.c source code file of the affected software. An attacker could exploit this vulnerability by supplying the targeted system with a quoted font family value. A successful exploit could allow the attacker to cause a stack-based buffer overflow condition that could result in a DoS condition or other unspecified impacts.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.GraphicsMagick has confirmed the vulnerability and released a software patch.
Analysis
- To exploit this vulnerability, an attacker would need network access and the ability to supply the targeted system with a quoted font family value. These requirements could reduce the likelihood of a successful exploit.
Safeguards
- Administrators are advised to apply the appropriate updates.Administrators are advised to allow only trusted users to have network access.Administrators are advised to monitor critical systems.
Vendor Announcements
- GraphicsMagick has posted a security issue at the following link: Issue #600
Fixed Software
- GraphicsMagick has issued a patch at the following link: SVGStartElement() patch
![GraphicsMagick SVGStartElement Function Stack-Based Buffer Overflow Vulnerability [CVE-2019-11005]](https://i0.wp.com/www.systemtek.co.uk/wp-content/uploads/2022/01/blank-profile-hi.png?resize=100%2C100)
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.