First published: Thu Sep 08 2016(Updated: )
Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/GraphicsMagick | <1.3.25 | 1.3.25 |
GraphicsMagick | =1.3.24 | |
Debian Debian Linux | =8.0 | |
openSUSE | =42.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7446 is considered a moderate severity vulnerability due to its potential for buffer overflow exploitation.
To fix CVE-2016-7446, upgrade GraphicsMagick to version 1.3.25 or later.
CVE-2016-7446 affects GraphicsMagick version 1.3.24 and prior.
Yes, CVE-2016-7446 allows remote attackers to exploit the vulnerability through specific vectors.
CVE-2016-7446 impacts systems running GraphicsMagick 1.3.24 on various Linux distributions, including Debian and openSUSE.