First published: Sat Jan 14 2017(Updated: )
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | ||
debian/8:6.9.6.6+dfsg-2 | <=undefined | |
debian/imagemagick | <=8:6.8.9.9-5+deb8u6<=8:6.8.9.9-5<=8:6.9.6.6+dfsg-1<=8:6.7.7.10-5 | 8:6.9.7.4+dfsg-1 8:6.8.9.9-5+deb8u7 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 | |
ImageMagick ImageMagick | <6.9.7-3 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.4-3 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5511 has a high severity level due to its potential to cause a heap-based buffer overflow allowing remote attackers to exploit the vulnerability.
To fix CVE-2017-5511, upgrade ImageMagick to version 8:6.9.7.4+dfsg-1 or later.
CVE-2017-5511 affects ImageMagick versions prior to 8:6.9.7-3 and all versions of ImageMagick 7 before 7.0.4-3.
Yes, CVE-2017-5511 can be exploited remotely due to improper casting vulnerabilities in ImageMagick.
CVE-2017-5511 is a heap-based buffer overflow vulnerability resulting from improper type casting.