coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3799 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/16/6 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/17/5 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/95746 | Broken Link Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/issues/347 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201702-09 | Third Party Advisory |
Configurations
History
27 Jun 2024, 14:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Debian debian Linux |
|
References | () http://www.debian.org/security/2017/dsa-3799 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95746 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201702-09 - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
Information
Published : 2017-03-24 15:59
Updated : 2024-06-27 14:37
NVD link : CVE-2017-5511
Mitre link : CVE-2017-5511
CVE.ORG link : CVE-2017-5511
JSON object : View
Products Affected
imagemagick
- imagemagick
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer