First published: Thu Jan 05 2017(Updated: )
A vulnerability was found in ImageMagick in the MSL interpreter. A maliciously crafted file could cause the application to crash. Upstream bug: <a href="https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30797">https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30797</a> References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845241">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845241</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22">https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <6.9.6 | 6.9.6 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 | |
ImageMagick ImageMagick | <=6.9.6-3 | |
openSUSE | =42.2 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10068 has a high severity rating as it can cause the application to crash when processing a specially crafted file.
To fix CVE-2016-10068, update ImageMagick to version 6.9.6 or later, or apply the appropriate patches provided by your distribution.
CVE-2016-10068 affects ImageMagick versions up to 6.9.6-3, including specific versions in Red Hat, Debian, and openSUSE environments.
While CVE-2016-10068 is not categorized as a remote code execution vulnerability, a malicious file could lead to application crashes if processed.
Applications utilizing ImageMagick for image processing are impacted by CVE-2016-10068 and may be vulnerable to crashes when processing manipulated files.