Vulnerability Details : CVE-2016-7800
Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2016-7800
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7800
2.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7800
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-7800
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7800
-
https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/
GraphicsMagick / Code / Commit [5c7b6d]Release Notes;Third Party Advisory
-
http://www.securityfocus.com/bid/93262
GraphicsMagick CVE-2016-7800 Heap Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2016/dsa-3746
Debian -- Security Information -- DSA-3746-1 graphicsmagickThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
openSUSE-SU-2016:2644-1: moderate: Security update for GraphicsMagickThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1381148
1381148 – (CVE-2016-7800) CVE-2016-7800 GraphicsMagick: 8BIM/8BIMW unsigned underflow leads to heap overflowIssue Tracking
-
http://www.securityfocus.com/bid/96135
RETIRED: GraphicsMagick CVE-2016-7800 Remote Integer Underflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2016/10/01/7
oss-security - Re: GraphicsMagick CVE request: 8BIM/8BIMW unsigned underflow leads to heap overflowMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
openSUSE-SU-2016:2641-1: moderate: Security update for GraphicsMagickThird Party Advisory
Jump to