Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
References
Configurations
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3799 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/01/16/6 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/01/17/5 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95753 - Third Party Advisory, VDB Entry | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851383 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/ImageMagick/ImageMagick/commit/9a069e0f2e027ec5138f998023cf9cb62c04889f - Patch, Vendor Advisory | |
References | () https://github.com/ImageMagick/ImageMagick/issues/354 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201702-09 - Third Party Advisory |
Information
Published : 2017-03-24 15:59
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5506
Mitre link : CVE-2017-5506
CVE.ORG link : CVE-2017-5506
JSON object : View
Products Affected
debian
- debian_linux
imagemagick
- imagemagick
CWE
CWE-415
Double Free