CVE-2017-16353
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
01/11/2017
Last modified:
20/04/2025
Description
GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode%3De4e1c2a581d8
- http://www.securityfocus.com/bid/101653
- https://blogs.securiteam.com/index.php/archives/3494
- https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- https://usn.ubuntu.com/4232-1/
- https://www.debian.org/security/2018/dsa-4321
- https://www.exploit-db.com/exploits/43111/
- ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode%3De4e1c2a581d8
- http://www.securityfocus.com/bid/101653
- https://blogs.securiteam.com/index.php/archives/3494
- https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- https://usn.ubuntu.com/4232-1/
- https://www.debian.org/security/2018/dsa-4321
- https://www.exploit-db.com/exploits/43111/