CVE-2016-7800
https://notcve.org/view.php?id=CVE-2016-7800
Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow. Desbordamiento de enteros en la función parse8BIM en coders/meta.c en GraphicsMagick 1.3.25 y versiones en anteriores permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un fragmento 8BIM manipulado, que desencadena un desbordamiento de búfer basado en memoria dinámica. • http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html http://www.debian.org/security/2016/dsa-3746 http://www.openwall.com/lists/oss-security/2016/10/01/7 http://www.securityfocus.com/bid/93262 http://www.securityfocus.com/bid/96135 https://bugzilla.redhat.com/show_bug.cgi?id=1381148 https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2016-7996
https://notcve.org/view.php?id=CVE-2016-7996
Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries. Desbordamiento de búfer basado en memoria dinámica en el lector de formato WPG en GraphicsMagick 1.3.25 y versiones anteriores permite a atacantes remotos tener un impacto no especificado a través de un mapa de color con un gran número de entradas. • http://www.debian.org/security/2016/dsa-3746 http://www.openwall.com/lists/oss-security/2016/10/07/4 http://www.openwall.com/lists/oss-security/2016/10/08/5 http://www.securityfocus.com/bid/93464 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-2318
https://notcve.org/view.php?id=CVE-2016-2318
GraphicsMagick 1.3.23 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted SVG file, related to the (1) DrawImage function in magick/render.c, (2) SVGStartElement function in coders/svg.c, and (3) TraceArcPath function in magick/render.c. GraphicsMagick 1.3.23 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL) a través de un archivo SVG manipulado, relacionado con (1) la función DrawImage en magick/render.c, (2) función SVGStartElement en coders/svg.c, y (3) función TraceArcPath en magick/render.c. • http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html http://www.debian.org/security/2016/dsa-3746 http://www.openwall.com/lists/oss-security/2016/02/11/6 http://www.openwall.com/lists/oss-security/2016/05/27/4 http://www.openwall.com/lists/oss-security/2016/05/31/3 http://www.openwall.com/lists/oss& • CWE-476: NULL Pointer Dereference •
CVE-2016-7997
https://notcve.org/view.php?id=CVE-2016-7997
The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer. El lector de formato WPG en GraphicsMagick 1.3.25 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y caída) a través de vectores relacionados con un ReferenceBlob y un puntero NULL. • http://www.debian.org/security/2016/dsa-3746 http://www.openwall.com/lists/oss-security/2016/10/07/4 http://www.openwall.com/lists/oss-security/2016/10/08/5 http://www.securityfocus.com/bid/93467 • CWE-476: NULL Pointer Dereference •
CVE-2016-2317
https://notcve.org/view.php?id=CVE-2016-2317
Multiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c. Múltiples desbordamientos de búfer en GraphicsMagick 1.3.23 permiten a atacantes remotos provocar una denegación de servicio (caída) a través de un archivo SVG manipulado, relacionado con (1) la función TracePoint en magick/render.c, (2) función GetToken en magick/utility.c, y (3) función GetTransformTokens en coders/svg.c. • http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html http://www.debian.org/security/2016/dsa-3746 http://www.openwall.com/lists/oss-security/2016/02/11/6 http://www.openwall.com/lists/oss-security/2016/05/20/4 http://www.openwall.com/lists/oss-security/2016/05/27/4 http://www.openwall.com/lists/oss& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •