The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2016-5688 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 5.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:N/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat OpenShift Enterprise 2 | ImageMagick | Will not fix |
Red Hat Enterprise Linux 7 | ImageMagick | Will not fix |
Red Hat Enterprise Linux 6 | ImageMagick | Will not fix |
Red Hat Enterprise Linux 5 | ImageMagick | Will not fix |