Description
The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
References (7)
Core 7
Core References
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/10/16/6
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/93597
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1385583
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2016/dsa-3746
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
http://hg.code.sf.net/p/graphicsmagick/code/rev/0a0dfa81906d
Patch, Third Party Advisory, VDB Entry x_refsource_misc
https://blogs.gentoo.org/ago/2016/09/15/graphicsmagick-stack-based-buffer-overflow-in-readsctimage-sct-c/
Scores
CVSS v3
7.5
EPSS
0.0178
EPSS Percentile
82.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (3)
debian/debian_linux
8.0
graphicsmagick/graphicsmagick
1.3.25
opensuse/opensuse
13.2
Published
Feb 15, 2017
Tracked Since
Feb 18, 2026