First published: Thu Jan 05 2017(Updated: )
An out of bounds read vulnerability was found in ImageMagick. A maliciously crafted file could cause the application to crash or have other unspecified impact. Upstream bug: <a href="https://github.com/ImageMagick/ImageMagick/issues/129">https://github.com/ImageMagick/ImageMagick/issues/129</a> References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/134463b926fa965571aa4febd61b810be5e7da05">https://github.com/ImageMagick/ImageMagick/commit/134463b926fa965571aa4febd61b810be5e7da05</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <7.0.1 | 7.0.1 |
ImageMagick | <=6.9.7-10 | |
SUSE Linux | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10065 is classified as a medium severity vulnerability due to the potential for application crashes and unspecified impacts.
To fix CVE-2016-10065, upgrade ImageMagick to version 7.0.1 or later for Red Hat or ensure versions are updated accordingly for other affected distributions.
CVE-2016-10065 affects ImageMagick versions prior to 6.9.7-10 and any version below 7.0.1.
Yes, a remote attacker can exploit CVE-2016-10065 by crafting a malicious file to trigger the vulnerability.
The potential impacts of CVE-2016-10065 include application crashes and other unspecified issues that may compromise system stability.