Name | CVE-2016-8862 |
Description | The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-756-1, DSA-3726-1 |
Debian Bugs | 845634 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
imagemagick (PTS) | bullseye | 8:6.9.11.60+dfsg-1.3+deb11u4 | fixed |
| bullseye (security) | 8:6.9.11.60+dfsg-1.3+deb11u3 | fixed |
| bookworm | 8:6.9.11.60+dfsg-1.6+deb12u2 | fixed |
| bookworm (security) | 8:6.9.11.60+dfsg-1.6+deb12u1 | fixed |
| trixie | 8:6.9.13.12+dfsg1-1 | fixed |
| sid | 8:7.1.1.39+dfsg1-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://blogs.gentoo.org/ago/2016/10/17/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c/
Fixed by: https://github.com/ImageMagick/ImageMagick/commit/aea6c6507f55632829e6432f8177a084a57c9fcc
The initial patch was initiall meant to be incomplete and resulted in CVE-2016-8866. So when fixing
this CVE make sure to fix it completely to not open up CVE-2016-8866.
The "incomplete fix" though is not a real problem, cf. https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30908#p140255
https://www.openwall.com/lists/oss-security/2016/10/17/4