Description
The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-731-1 | imagemagick security update |
Debian DSA |
DSA-3652-1 | imagemagick security update |
EUVD |
EUVD-2016-6631 | The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions. |
Ubuntu USN |
USN-3131-1 | ImageMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:07:59.968Z
Reserved: 2016-06-16T00:00:00.000Z
Link: CVE-2016-5688
No data.
Status : Modified
Published: 2016-12-13T15:59:01.217
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-5688
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN