Description
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
References (9)
Core 9
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/ImageMagick/ImageMagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/16/6
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201702-09
Broken Link, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/95746
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3799
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/ImageMagick/ImageMagick/issues/347
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/17/5
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790
Scores
CVSS v3
9.8
EPSS
0.0135
EPSS Percentile
80.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
Status
published
Products (3)
debian/debian_linux
8.0
debian/debian_linux
9.0
imagemagick/imagemagick
< 6.9.7-3
Published
Mar 24, 2017
Tracked Since
Feb 18, 2026