First published: Thu Jan 05 2017(Updated: )
A use-after-free vulnerability was found in ImageMagick. A maliciously crafted file could cause the application to crash or possibly have other impact. Upstream bug: <a href="https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245">https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245</a> References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521">https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <6.9.5 | 6.9.5 |
ImageMagick | =6.9.5-5 | |
SUSE Linux | =42.1 | |
SUSE Linux | =42.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10051 is considered a medium severity vulnerability due to its potential to cause application crashes.
To fix CVE-2016-10051, upgrade ImageMagick to version 6.9.5-6 or later.
CVE-2016-10051 can lead to application crashes or potentially allow for further exploitation if a maliciously crafted file is processed.
CVE-2016-10051 affects ImageMagick versions up to and including 6.9.5.
CVE-2016-10051 is not classified as a remote code execution vulnerability but poses risks of application crashes.