CVE-2017-16546
moderate-risk
Published 2017-11-05
The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.
Do I need to act?
-
0.32% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (7)
Affected Vendors
References (12)
Issue Tracking
https://github.com/ImageMagick/ImageMagick/issues/851
Third Party Advisory
https://usn.ubuntu.com/3681-1/
Third Party Advisory
https://www.debian.org/security/2017/dsa-4040
Third Party Advisory
https://www.debian.org/security/2017/dsa-4074
Issue Tracking
https://github.com/ImageMagick/ImageMagick/issues/851
Third Party Advisory
https://usn.ubuntu.com/3681-1/
Third Party Advisory
https://www.debian.org/security/2017/dsa-4040
Third Party Advisory
https://www.debian.org/security/2017/dsa-4074
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate