First published: Wed Feb 10 2016(Updated: )
Multiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick | =1.3.23 | |
Debian Linux | =8.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
SUSE Studio | =1.3 | |
SUSE Linux | =42.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
=1.3.23 | ||
=8.0 | ||
=11-sp4 | ||
=1.3 | ||
=42.1 | ||
=13.2 | ||
=11-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2317 is rated as a high severity vulnerability due to the potential for denial of service attacks.
To fix CVE-2016-2317, upgrade GraphicsMagick to version 1.3.24 or later.
GraphicsMagick version 1.3.23 is specifically affected by CVE-2016-2317.
CVE-2016-2317 is a buffer overflow vulnerability that can result in application crashes.
Yes, CVE-2016-2317 can be exploited remotely using crafted SVG files.