The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
{ "vanir_signatures": [ { "id": "CVE-2016-5688-13ce21f0", "digest": { "length": 7945.0, "function_hash": "72809647637280565824983334021021529635" }, "signature_version": "v1", "target": { "file": "MagickCore/cache.c", "function": "OpenPixelCache" }, "deprecated": false, "signature_type": "Function", "source": "https://github.com/imagemagick/imagemagick/commit/aecd0ada163a4d6c769cec178955d5f3e9316f2f" }, { "id": "CVE-2016-5688-80011e2b", "digest": { "threshold": 0.9, "line_hashes": [ "290584930245094986198409811660524185053", "317887526420752321230979234148795944236", "289454378081425118523668904136587896834", "226407080177757049156873276359830884467", "120859661043048946946333961149048632408", "334226194622420835021555523262904689197", "197805291447083308206149075321773785235", "52896354688185095764008338588287758663", "309277963772199422984263840105912057090", "217762545086857290390415744119826831083", "275765658176708660247917740740722594405", "319570536527132405217467385660572697745", "84401320335838798864761542588995076410", "5929252833585505000467083526661866021" ] }, "signature_version": "v1", "target": { "file": "coders/wpg.c" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/imagemagick/imagemagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7" }, { "id": "CVE-2016-5688-8c13fc1f", "digest": { "length": 4146.0, "function_hash": "112595478332372537989784891132300193587" }, "signature_version": "v1", "target": { "file": "MagickCore/image.c", "function": "CloneImage" }, "deprecated": false, "signature_type": "Function", "source": "https://github.com/imagemagick/imagemagick/commit/aecd0ada163a4d6c769cec178955d5f3e9316f2f" }, { "id": "CVE-2016-5688-9cf90936", "digest": { "threshold": 0.9, "line_hashes": [ "120831310446799761248751621864552862659", "144555323116376029190532268056337195798", "279148503738646452488520717201283591653", "129626382430702992517780016545509344028", "296408050992988648284932206208651883087", "14543995638151310093237245804460465875", "324904478738611458705314176876477885525", "269726917320380422511519836113986622530", "80137253431406971029631984286137869001", "66581534854776199800096637416044424729", "137517575582475808463823424976424700249", "184132997090639054663596222134371318148", "126758484386820947510164596989372935997", "305365869112126856560107933276065003892", "124634286631099886374741093067223652439", "215832350195892322730113685545615517210", "51506374230171580612940895707342760888", "334619740070690733833776029802773487575", "230540054804232375420774227827948302866", "165349625123635821592165998673127278824" ] }, "signature_version": "v1", "target": { "file": "MagickCore/cache.c" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/imagemagick/imagemagick/commit/aecd0ada163a4d6c769cec178955d5f3e9316f2f" }, { "id": "CVE-2016-5688-b5912e53", "digest": { "threshold": 0.9, "line_hashes": [ "87843269622060485559679692963953899814", "116489015082790016687258357910714475933", "101025356804883231786904477750292549428", "296022639761418808898012969989528199869" ] }, "signature_version": "v1", "target": { "file": "MagickCore/image.c" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/imagemagick/imagemagick/commit/aecd0ada163a4d6c769cec178955d5f3e9316f2f" }, { "id": "CVE-2016-5688-bc7b5a5c", "digest": { "length": 11847.0, "function_hash": "69505567914165268061112661308026142772" }, "signature_version": "v1", "target": { "file": "coders/wpg.c", "function": "ReadWPGImage" }, "deprecated": false, "signature_type": "Function", "source": "https://github.com/imagemagick/imagemagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7" } ] }