Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-8683

Опубликовано: 15 фев. 2017
Источник: debian

Описание

The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
graphicsmagickfixed1.3.25-5package

Примечания

  • https://blogs.gentoo.org/ago/2016/09/15/graphicsmagick-memory-allocation-failure-in-readpcximage-pcx-c/

  • Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/b9edafd479b9

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."

CVSS3: 7.8
nvd
почти 9 лет назад

The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."

CVSS3: 7.8
github
больше 3 лет назад

The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."

suse-cvrf
больше 9 лет назад

Security update for GraphicsMagick

suse-cvrf
больше 9 лет назад

Security update for GraphicsMagick