To exploit this vulnerability, the image must be created under very specific condition listed here.
Article Link: https://isc.sans.edu/diary/rss/29670
To exploit this vulnerability, the image must be created under very specific condition listed here.
Article Link: https://isc.sans.edu/diary/rss/29670