First published: Fri Dec 23 2016(Updated: )
An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 | |
ImageMagick | =7.0.3-1 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8707 has a critical severity rating due to its potential to enable remote code execution through out of bounds write vulnerabilities.
To fix CVE-2016-8707, update ImageMagick to version 8:6.9.11.60+dfsg-1.3+deb11u4 or later for Debian systems.
CVE-2016-8707 affects ImageMagick version 7.0.3-1 and earlier versions.
Yes, CVE-2016-8707 can be exploited remotely if a user processes a maliciously crafted TIFF file.
Applications using ImageMagick, particularly those that handle TIFF images, are impacted by CVE-2016-8707.