coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3799 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/16/6 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/17/5 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/95746 | Broken Link Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42 | Issue Tracking Patch Third Party Advisory |
https://github.com/ImageMagick/ImageMagick/issues/347 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201702-09 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: debian
Published: 2017-03-24T15:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2017-01-16T00:00:00
Link: CVE-2017-5511
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-03-24T15:59:01.217
Modified: 2024-06-27T14:37:57.227
Link: CVE-2017-5511
JSON object: View
Redhat Information
No data.
CWE