First published: Thu Jan 05 2017(Updated: )
An unchecked return value vulnerability was found in ImageMagick in the tiff.c file. A maliciously crafted file could cause the application to crash. Upstream bug: <a href="https://github.com/ImageMagick/ImageMagick/issues/196">https://github.com/ImageMagick/ImageMagick/issues/196</a> References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845196">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845196</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9">https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <7.0.1 | 7.0.1 |
ImageMagick | <6.9.4-8 | |
ImageMagick | >=7.0.0-0<7.0.1-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10061 has a medium severity level as it can cause application crashes due to an unchecked return value.
To fix CVE-2016-10061, upgrade ImageMagick to version 7.0.1 or later.
CVE-2016-10061 affects ImageMagick versions before 7.0.1 and including versions up to 6.9.4-8.
CVE-2016-10061 is an unchecked return value vulnerability that may lead to application crashes.
Additional information about CVE-2016-10061 can be found in the ImageMagick GitHub issue tracker and various security advisories.