CVE-2016-4564

Publication date 4 June 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.

Read the notes from the security team

Status

Package Ubuntu Release Status
imagemagick 16.10 yakkety
Fixed 8:6.8.9.9-7ubuntu8.1
16.04 LTS xenial
Fixed 8:6.8.9.9-7ubuntu5.2
15.10 wily Ignored end of life
14.04 LTS trusty
Fixed 8:6.7.7.10-6ubuntu3.2
12.04 LTS precise
Fixed 8:6.6.9.7-5ubuntu3.5

Notes


mdeslaur

This is 0122-Prevent-buffer-overflow-in-magick-draw.c.patch

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
imagemagick

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3131-1
    • ImageMagick vulnerabilities
    • 21 November 2016

Other references