{"id":"CVE-2016-6491","details":"Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.","modified":"2026-04-16T06:20:53.660726339Z","published":"2016-12-13T15:59:09.217Z","related":["SUSE-SU-2016:2075-1","SUSE-SU-2016:2076-1"],"references":[{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92186"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036501"},{"type":"ADVISORY","url":"https://github.com/ImageMagick/ImageMagick/blob/6.9.5-4/ChangeLog"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-21"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/dd84447b63a71fa8c3f47071b09454efc667767b"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/07/28/13"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2016/07/28/15"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"last_affected":"e46b7d19de7914881986ef939f690facc7a0198d"},{"introduced":"0"},{"last_affected":"044a9bc056a8e0a7979009b41901e97640626257"},{"introduced":"0"},{"last_affected":"f67a61425f27009d4ac16a62e31758e5af3a7226"},{"introduced":"0"},{"last_affected":"1a5fed605982a1a20e8e9bd57502e2ce94d7dc3e"},{"introduced":"0"},{"last_affected":"ac72d94febc1744579bad2646685a2054c087594"},{"introduced":"0"},{"last_affected":"580b68fc398b9bf7ec1a025524f294ce76fcf521"},{"introduced":"0"},{"last_affected":"8af0c7343af5ecda6a99611333321ca283ae505a"},{"introduced":"0"},{"last_affected":"59ff8f4d216c030529c39fbefbd13fed45a29c63"},{"introduced":"0"},{"last_affected":"fe4eecee8c4942cb836bc63f79ed5eaa39069f69"},{"introduced":"0"},{"last_affected":"3cf86f2d1d1ef36d99879c6e5d206138a72e156a"},{"introduced":"0"},{"last_affected":"2615e69b7e7d72e3bd5eef828708d08d1490b7fe"},{"introduced":"0"},{"last_affected":"25ea4de824468525f809ed1d62946626cb6e8aa6"},{"introduced":"0"},{"last_affected":"01588fbdd5469847e919b472e8bfbd69bef0d652"},{"introduced":"0"},{"last_affected":"b260eaadf2c72ffbe5a598e46ef6cee15fd2548f"},{"introduced":"0"},{"last_affected":"c3e69b0b7c24534f14cf604304324d01b082833a"},{"introduced":"0"},{"last_affected":"5cbdc8e011effc2ca5d2c6f15377263105c152a2"},{"introduced":"0"},{"last_affected":"98f90370b548e09494b1ee5c05d03e19d6e476af"},{"fixed":"dd84447b63a71fa8c3f47071b09454efc667767b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.1-0"},{"introduced":"0"},{"last_affected":"7.0.1-1"},{"introduced":"0"},{"last_affected":"7.0.1-2"},{"introduced":"0"},{"last_affected":"7.0.1-3"},{"introduced":"0"},{"last_affected":"7.0.1-4"},{"introduced":"0"},{"last_affected":"7.0.1-5"},{"introduced":"0"},{"last_affected":"7.0.1-6"},{"introduced":"0"},{"last_affected":"7.0.1-7"},{"introduced":"0"},{"last_affected":"7.0.1-8"},{"introduced":"0"},{"last_affected":"7.0.1-9"},{"introduced":"0"},{"last_affected":"7.0.1-10"},{"introduced":"0"},{"last_affected":"7.0.2-0"},{"introduced":"0"},{"last_affected":"7.0.2-1"},{"introduced":"0"},{"last_affected":"7.0.2-2"},{"introduced":"0"},{"last_affected":"7.0.2-3"},{"introduced":"0"},{"last_affected":"7.0.2-4"},{"introduced":"0"},{"last_affected":"7.0.2-5"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"last_affected":"ee58391aabd78becbe67878f6d4270a37eff9d6f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.9.5-3"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-2","6.9.5-3","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5"],"database_specific":{"vanir_signatures_modified":"2026-04-11T04:02:30Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.3"}]}],"vanir_signatures":[{"signature_version":"v1","deprecated":false,"signature_type":"Line","id":"CVE-2016-6491-c0e0875a","target":{"file":"MagickCore/property.c"},"source":"https://github.com/imagemagick/imagemagick/commit/dd84447b63a71fa8c3f47071b09454efc667767b","digest":{"line_hashes":["241217519160942786707834831173525707874","59056741932824958857864971591163893937","122973178970279523316782367189729149634","177295067256838802184830878822483116736"],"threshold":0.9}},{"signature_version":"v1","deprecated":false,"signature_type":"Function","id":"CVE-2016-6491-d7d6582e","target":{"file":"MagickCore/property.c","function":"Get8BIMProperty"},"source":"https://github.com/imagemagick/imagemagick/commit/dd84447b63a71fa8c3f47071b09454efc667767b","digest":{"length":3131,"function_hash":"49450834786374495517076233315258723851"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6491.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}