Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11505 : What You Need to Know

CVE-2017-11505 allows remote attackers to trigger a denial of service in ImageMagick versions 6.9.9-0 through 6.9.9-6 and 7.x through 7.0.6-1 by exploiting a vulnerability in the ReadOneJNGImage function.

Remote attackers can trigger a denial of service attack by exploiting a vulnerability in the ReadOneJNGImage function within the png.c file in ImageMagick versions 6.9.9-0 through 6.9.9-6 and 7.x versions through 7.0.6-1. This can be achieved by using a distorted JNG file, which causes a significant loop and excessive CPU consumption, leading to the unavailability of the affected system.

Understanding CVE-2017-11505

This CVE entry describes a vulnerability in ImageMagick that allows remote attackers to launch a denial of service attack.

What is CVE-2017-11505?

The vulnerability in the ReadOneJNGImage function in ImageMagick versions 6.9.9-0 through 6.9.9-6 and 7.x through 7.0.6-1 enables remote attackers to cause a denial of service by exploiting a malformed JNG file.

The Impact of CVE-2017-11505

Exploiting this vulnerability can lead to a denial of service condition on the affected system due to excessive CPU consumption, triggered by a distorted JNG file.

Technical Details of CVE-2017-11505

This section provides more technical insights into the vulnerability.

Vulnerability Description

The ReadOneJNGImage function in coders/png.c in ImageMagick allows remote attackers to cause a denial of service through a large loop and CPU consumption when processing a malformed JNG file.

Affected Systems and Versions

        ImageMagick versions 6.9.9-0 through 6.9.9-6
        ImageMagick 7.x versions through 7.0.6-1

Exploitation Mechanism

The vulnerability can be exploited by using a distorted JNG file, which triggers a significant loop and results in excessive CPU consumption.

Mitigation and Prevention

Protecting systems from CVE-2017-11505 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply vendor-supplied patches or updates promptly.
        Consider implementing network-level protections to filter out malicious JNG files.

Long-Term Security Practices

        Regularly update and patch software to address known vulnerabilities.
        Monitor and restrict network traffic to prevent malicious file uploads.

Patching and Updates

Ensure that ImageMagick is updated to versions that contain fixes for the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now