First published: Mon Oct 03 2016(Updated: )
An unsigned overflow leading to heap buffer overflow vulnerability was found in GraphicsMagick 8BIM reader. A maliciously crafted file could cause the application to crash. References: <a href="http://seclists.org/oss-sec/2016/q4/0">http://seclists.org/oss-sec/2016/q4/0</a> Upstream patch: <a href="https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/">https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GraphicsMagick | <=1.3.25 | |
openSUSE | =42.1 | |
openSUSE | =13.2 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7800 is classified as a critical vulnerability due to its potential to cause application crashes.
To fix CVE-2016-7800, update GraphicsMagick to version 1.3.26 or later.
CVE-2016-7800 affects GraphicsMagick versions up to and including 1.3.25.
CVE-2016-7800 impacts systems running vulnerable versions of GraphicsMagick on various Linux distributions.
CVE-2016-7800 does not directly lead to remote code execution but can cause denial of service by crashing the application.