Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7996

Опубликовано: 18 янв. 2017
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
graphicsmagickfixed1.3.21-2package

Примечания

  • The patch addressing CVE-2016-7996 applied is in 1.3.25-4, but in

  • the experimental upload 1.3.20-4 and later uploaded to unstable as

  • 1.3.21-2 the build is done with --with-quantum-depth=16 switching

  • away from the default with QuantumDepth=8

  • patch for this and CVE-2016-7997 at: http://openwall.com/lists/oss-security/2016/10/07/4

EPSS

Процентиль: 78%
0.01164
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.

CVSS3: 9.8
nvd
около 9 лет назад

Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.

CVSS3: 9.8
github
больше 3 лет назад

Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.

CVSS3: 9.8
fstec
больше 9 лет назад

Уязвимость кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

suse-cvrf
около 8 лет назад

Security update for GraphicsMagick

EPSS

Процентиль: 78%
0.01164
Низкий