{"id":"CVE-2017-14341","details":"ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.","modified":"2026-02-23T01:36:00.309352Z","published":"2017-09-12T17:29:00.273Z","related":["SUSE-SU-2017:3378-1","SUSE-SU-2017:3388-1","SUSE-SU-2017:3435-1"],"references":[{"type":"ADVISORY","url":"https://github.com/ImageMagick/ImageMagick/commit/7d63315a64267c565d1f34b9cb523a14616fed24"},{"type":"ADVISORY","url":"https://github.com/ImageMagick/ImageMagick/issues/654"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/7d63315a64267c565d1f34b9cb523a14616fed24"},{"type":"EVIDENCE","url":"https://github.com/ImageMagick/ImageMagick/issues/654"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"7d63315a64267c565d1f34b9cb523a14616fed24"}]}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-14341.json","vanir_signatures":[{"digest":{"line_hashes":["264069847739342742262050203276362752290","62457804762545849136081094378638466557","152019393499513494018431882395682383995","189361514062970411239919900370510584355"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/7d63315a64267c565d1f34b9cb523a14616fed24","deprecated":false,"signature_type":"Line","target":{"file":"coders/wpg.c"},"signature_version":"v1","id":"CVE-2017-14341-3d029cf6"},{"digest":{"length":12059,"function_hash":"217656380488394792255324084581450217986"},"source":"https://github.com/imagemagick/imagemagick/commit/7d63315a64267c565d1f34b9cb523a14616fed24","deprecated":false,"signature_type":"Function","target":{"file":"coders/wpg.c","function":"ReadWPGImage"},"signature_version":"v1","id":"CVE-2017-14341-f3792263"}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}