CVE-2016-6491 - Out-of-bounds Read

Severity

68%

Complexity

86%

Confidentiality

106%

Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.

Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.

CVSS 3.0 Base Score 8.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 8 years ago

2016-12-13 15:59:00

Last updated 7 years ago

2017-07-01 01:30:00

Affected Software

ImageMagick

ImageMagick 7.0.1-0

7.0.1-0

ImageMagick 7.0.1-1

7.0.1-1

ImageMagick 7.0.1-2

7.0.1-2

ImageMagick 7.0.1-3

7.0.1-3

ImageMagick 7.0.1-4

7.0.1-4

ImageMagick 7.0.1-5

7.0.1-5

ImageMagick 7.0.1-6

7.0.1-6

ImageMagick 7.0.1-7

7.0.1-7

ImageMagick 7.0.1-8

7.0.1-8

ImageMagick 7.0.1-9

7.0.1-9

ImageMagick 7.0.1-10

7.0.1-10

ImageMagick 7.0.2-0

7.0.2-0

ImageMagick 7.0.2-1

7.0.2-1

ImageMagick 7.0.2-2

7.0.2-2

ImageMagick 7.0.2-3

7.0.2-3

ImageMagick 7.0.2-4

7.0.2-4

ImageMagick 7.0.2-5

7.0.2-5

Oracle Solaris 11.3

11.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.