← Back to CVEs
CVE-2016-9556
N/ADescription
The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
CVE Details
CVSS v3.1 ScoreN/A
Published3/23/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuximagemagick:imagemagickopensuse_project:leap
Weaknesses (CWE)
CWE-119
References
http://www.debian.org/security/2016/dsa-3726(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2016/11/23/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2016/12/01/4(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2016/12/02/12(cve@mitre.org)
http://www.securityfocus.com/bid/94492(cve@mitre.org)
https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=1398198(cve@mitre.org)
https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99(cve@mitre.org)
http://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3726(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/11/23/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/12/01/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/12/02/12(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94492(af854a3a-2127-422b-91ae-364da2661108)
https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1398198(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.