{"id":"CVE-2016-10051","details":"Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.","modified":"2026-04-16T06:19:04.293620456Z","published":"2017-03-23T17:59:00.470Z","related":["SUSE-SU-2017:0518-1","SUSE-SU-2017:0529-1","SUSE-SU-2017:0586-1"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/26/9"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95187"},{"type":"ADVISORY","url":"https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1410456"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"548701354191a3dda5cffc6d415374b35b01d0b9"},{"fixed":"ecc03a2518c2b7dd375fde3a040fdae0bdf6a521"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"last_affected":"839128db329afbe0195137820266efbf7de9baf7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.9.5-5"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6"],"database_specific":{"vanir_signatures_modified":"2026-04-11T03:43:35Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10051.json","vanir_signatures":[{"signature_version":"v1","signature_type":"Function","source":"https://github.com/imagemagick/imagemagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521","deprecated":false,"id":"CVE-2016-10051-1ce242a6","digest":{"length":3169,"function_hash":"112344514761409233098529587784635627443"},"target":{"file":"coders/pwp.c","function":"ReadPWPImage"}},{"target":{"file":"coders/pwp.c","function":"ReadPWPImage"},"signature_version":"v1","source":"https://github.com/imagemagick/imagemagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9","signature_type":"Function","id":"CVE-2016-10051-51b6d694","digest":{"length":3191,"function_hash":"251591791082250468375542980523777222426"},"deprecated":false},{"signature_version":"v1","signature_type":"Line","source":"https://github.com/imagemagick/imagemagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9","deprecated":false,"id":"CVE-2016-10051-90c52b21","digest":{"threshold":0.9,"line_hashes":["326860355691829552683586416980822037330","297762523882933411879215595002057674510","113383696013090573040236781499743361414","199093459669254256153376441116227819955","284644810741949044403809340315222715947"]},"target":{"file":"coders/pwp.c"}},{"target":{"file":"coders/pwp.c"},"signature_version":"v1","source":"https://github.com/imagemagick/imagemagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521","signature_type":"Line","id":"CVE-2016-10051-cba6ff89","digest":{"threshold":0.9,"line_hashes":["326860355691829552683586416980822037330","297762523882933411879215595002057674510","113383696013090573040236781499743361414","199093459669254256153376441116227819955","284644810741949044403809340315222715947"]},"deprecated":false}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}