CVE-2016-2317

NameCVE-2016-2317
DescriptionMultiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-484-1, DSA-3746-1
NVD severitymedium (attack range: remote)
Debian Bugs814732

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
graphicsmagick (PTS)wheezy1.3.16-1.1vulnerable
wheezy (security)1.3.16-1.1+deb7u10fixed
jessie1.3.20-3+deb8u1vulnerable
jessie (security)1.3.20-3+deb8u2fixed
stretch1.3.25-8fixed
buster1.3.26-14fixed
sid1.3.26-15fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
graphicsmagicksource(unstable)1.3.24-1medium814732
graphicsmagicksourcejessie1.3.20-3+deb8u2mediumDSA-3746-1
graphicsmagicksourcewheezy1.3.16-1.1+deb7u1mediumDLA-484-1

Notes

FIX http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98394eb235a6
FIX http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52b59d2ef4a1
FIX http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/44ed8318ba6a

Search for package or bug name: Reporting problems