CVE-2016-7514
Published: 25 August 2016
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
Notes
Author | Note |
---|---|
mdeslaur | This is 0084-Added-check-for-bit-depth-1-for-PSD-file.patch, 0085-Fixed-overflow-in-psd-file-handling.patch, 0086-Added-missing-call-to-ConstrainColormapIndex-avoidin.patch, 0087-Rewrite-reading-pixel-values-for-psd-file.patch |
Priority
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
precise |
Released
(8:6.6.9.7-5ubuntu3.5)
|
trusty |
Released
(8:6.7.7.10-6ubuntu3.2)
|
|
upstream |
Released
(8:6.8.9.9-5+deb8u4)
|
|
xenial |
Released
(8:6.8.9.9-7ubuntu5.2)
|
|
yakkety |
Released
(8:6.8.9.9-7ubuntu8.1)
|
|
Patches: upstream: https://github.com/ImageMagick/ImageMagick/commit/198fffab4daf8aea88badd9c629350e5b26ec32f upstream: https://github.com/ImageMagick/ImageMagick/commit/6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d upstream: https://github.com/ImageMagick/ImageMagick/commit/e14fd0a2801f73bdc123baf4fbab97dec55919eb upstream: https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |