Description
The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-731-1 | imagemagick security update |
Debian DSA |
DSA-3652-1 | imagemagick security update |
EUVD |
EUVD-2016-6631 | The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions. |
Ubuntu USN |
USN-3131-1 | ImageMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:07:59.968Z
Reserved: 2016-06-16T00:00:00.000Z
Link: CVE-2016-5688
No data.
Status : Deferred
Published: 2016-12-13T15:59:01.217
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-5688
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN