CVE-2016-5688

EUVD-2016-6631
The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
oraclesolaris
11.3
imagemagickimagemagick
𝑥
≤ 6.9.4-3
imagemagickimagemagick
7.0.1-0
imagemagickimagemagick
7.0.1-1
imagemagickimagemagick
7.0.1-2
imagemagickimagemagick
7.0.1-3
imagemagickimagemagick
7.0.1-4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
imagemagick
bookworm
8:6.9.11.60+dfsg-1.6+deb12u2
fixed
bookworm (security)
8:6.9.11.60+dfsg-1.6+deb12u1
fixed
bullseye
8:6.9.11.60+dfsg-1.3+deb11u4
fixed
bullseye (security)
8:6.9.11.60+dfsg-1.3+deb11u3
fixed
sid
8:7.1.1.39+dfsg1-2
fixed
trixie
8:6.9.13.12+dfsg1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
imagemagick
precise
Fixed 8:6.6.9.7-5ubuntu3.5
released
trusty
Fixed 8:6.7.7.10-6ubuntu3.2
released
wily
ignored
xenial
Fixed 8:6.8.9.9-7ubuntu5.2
released
yakkety
Fixed 8:6.8.9.9-7ubuntu8.1
released