First published: Thu Nov 09 2017(Updated: )
coders/wpg.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-16669.
The severity of CVE-2017-16669 is high, with a severity value of 8.8.
CVE-2017-16669 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact on GraphicsMagick.
To fix CVE-2017-16669, it is recommended to update GraphicsMagick to version 1.3.23-1ubuntu0.5 or higher.
Yes, you can find more information about CVE-2017-16669 at the following references: [Reference 1](http://hg.code.sf.net/p/graphicsmagick/code/rev/135bdcb88b8d), [Reference 2](http://hg.code.sf.net/p/graphicsmagick/code/rev/1b9e64a8901e), [Reference 3](http://hg.code.sf.net/p/graphicsmagick/code/rev/2a21cda3145b).