CVE-2016-2317

Multiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3746 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/02/11/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/20/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/27/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/31/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/07/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/18/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/83241 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1306148 Issue Tracking
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3746 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/02/11/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/20/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/27/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/31/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/07/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/18/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/83241 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1306148 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.23:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3746 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3746 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/02/11/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/02/11/6 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/20/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/20/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/27/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/27/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/31/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/31/3 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/09/07/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/07/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/09/18/8 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/18/8 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/83241 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/83241 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1306148 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1306148 - Issue Tracking

Information

Published : 2017-02-03 15:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2317

Mitre link : CVE-2016-2317

CVE.ORG link : CVE-2016-2317


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

suse

  • linux_enterprise_software_development_kit
  • studio_onsite
  • linux_enterprise_debuginfo

debian

  • debian_linux

graphicsmagick

  • graphicsmagick
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer