First published: Sat Jan 14 2017(Updated: )
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imagemagick | <=8:6.8.9.9-5<=8:6.8.9.9-5+deb8u6<=8:6.7.7.10-5<=8:6.9.6.6+dfsg-1 | 8:6.9.7.4+dfsg-1 8:6.8.9.9-5+deb8u7 |
debian/8:6.9.6.6+dfsg-2 | <=undefined | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 | |
ImageMagick | <6.9.7-4 | |
ImageMagick | >=7.0.0-0<7.0.4-4 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5510 is classified as critical due to its potential for remote code execution through an out-of-bounds write.
To fix CVE-2017-5510, upgrade ImageMagick to a version that is not vulnerable, starting from 8:6.9.7.4+dfsg-1 or later.
CVE-2017-5510 affects ImageMagick versions up to and including 8:6.9.7.4 and earlier.
Using older versions of ImageMagick that are affected by CVE-2017-5510 is highly discouraged due to security risks.
CVE-2017-5510 can allow remote attackers to execute arbitrary code via crafted PSD files.