CVE-2016-5688

The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
oraclesolaris
11.3
imagemagickimagemagick
𝑥
≤ 6.9.4-3
imagemagickimagemagick
7.0.1-0
imagemagickimagemagick
7.0.1-1
imagemagickimagemagick
7.0.1-2
imagemagickimagemagick
7.0.1-3
imagemagickimagemagick
7.0.1-4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
imagemagick
bullseye
8:6.9.11.60+dfsg-1.3+deb11u4
fixed
bullseye (security)
8:6.9.11.60+dfsg-1.3+deb11u3
fixed
bookworm
8:6.9.11.60+dfsg-1.6+deb12u2
fixed
bookworm (security)
8:6.9.11.60+dfsg-1.6+deb12u1
fixed
trixie
8:6.9.13.12+dfsg1-1
fixed
sid
8:7.1.1.39+dfsg1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
imagemagick
yakkety
Fixed 8:6.8.9.9-7ubuntu8.1
released
xenial
Fixed 8:6.8.9.9-7ubuntu5.2
released
wily
ignored
trusty
Fixed 8:6.7.7.10-6ubuntu3.2
released
precise
Fixed 8:6.6.9.7-5ubuntu3.5
released