{"id":"CVE-2017-14173","details":"In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation \"GetQuantumRange(depth)+1\" when \"depth\" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large \"max_value\" value.","modified":"2026-04-11T04:14:21.382603Z","published":"2017-09-07T06:29:00.360Z","related":["SUSE-SU-2017:3378-1","SUSE-SU-2017:3388-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201711-07"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/50f54462076648ac2e36c3f58f4dadd4babbf1c9"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/713"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"50f54462076648ac2e36c3f58f4dadd4babbf1c9"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"50f54462076648ac2e36c3f58f4dadd4babbf1c9"}]}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9"],"database_specific":{"vanir_signatures":[{"target":{"file":"coders/txt.c","function":"ReadTXTImage"},"signature_type":"Function","id":"CVE-2017-14173-b628027c","digest":{"length":4820,"function_hash":"150276388619045766393549832452160647631"},"signature_version":"v1","deprecated":false,"source":"https://github.com/imagemagick/imagemagick/commit/50f54462076648ac2e36c3f58f4dadd4babbf1c9"},{"target":{"file":"coders/txt.c"},"signature_type":"Line","id":"CVE-2017-14173-e38dc641","digest":{"threshold":0.9,"line_hashes":["311074768544482919032467925574160356393","122138833527173680934513774449372318840","132437139816850860091932509113197936588","213319536479349872619834108391588387466"]},"signature_version":"v1","deprecated":false,"source":"https://github.com/imagemagick/imagemagick/commit/50f54462076648ac2e36c3f58f4dadd4babbf1c9"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0.6-10"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"vanir_signatures_modified":"2026-04-11T04:14:21Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14173.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}