CVE-2016-10063
Published: 2 March 2017
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
Notes
Author | Note |
---|---|
mdeslaur | This is 0159-Check-validity-of-extend-during-TIFF-file-reading.patch |
Priority
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
precise |
Released
(8:6.6.9.7-5ubuntu3.6)
|
trusty |
Released
(8:6.7.7.10-6ubuntu3.3)
|
|
upstream |
Released
(8:6.9.6.2+dfsg-2)
|
|
xenial |
Released
(8:6.8.9.9-7ubuntu5.3)
|
|
yakkety |
Released
(8:6.8.9.9-7ubuntu8.2)
|
|
Patches: upstream: https://github.com/ImageMagick/ImageMagick/commit/2bb6941a2d557f26a2f2049ade466e118eeaab91 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |