{"id":"CVE-2016-7536","details":"magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.","modified":"2026-04-11T05:00:54.469303Z","published":"2017-04-20T18:59:01.437Z","related":["CGA-v228-x2r8-gq5m"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93225"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378772"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/130"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/09/22/2"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"02dadf116124cfba35d7ebd9ced3e5ad0be0f176"},{"fixed":"478cce544fdf1de882d78381768458f397964453"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"4bae9bed8a79e031884ca9a4681dce89dbd26855"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.4-0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7536.json","vanir_signatures_modified":"2026-04-11T05:00:54Z","vanir_signatures":[{"deprecated":false,"target":{"function":"WriteTo8BimProfile","file":"magick/profile.c"},"id":"CVE-2016-7536-46c8ffc1","source":"https://github.com/imagemagick/imagemagick/commit/478cce544fdf1de882d78381768458f397964453","signature_type":"Function","signature_version":"v1","digest":{"length":1873,"function_hash":"37050166569566636881308913669939820798"}},{"deprecated":false,"target":{"file":"magick/profile.c"},"id":"CVE-2016-7536-4f037a63","source":"https://github.com/imagemagick/imagemagick/commit/478cce544fdf1de882d78381768458f397964453","signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["122791646321954844747171237639594463691","267082534527191666955084411774895493083","106386253077854813831797588485624939567","320726689913827354715295875061720204477"]}},{"deprecated":false,"target":{"file":"MagickCore/profile.c"},"id":"CVE-2016-7536-92363b33","source":"https://github.com/imagemagick/imagemagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176","signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["122791646321954844747171237639594463691","267082534527191666955084411774895493083","106386253077854813831797588485624939567","320726689913827354715295875061720204477"]}},{"deprecated":false,"target":{"function":"WriteTo8BimProfile","file":"MagickCore/profile.c"},"id":"CVE-2016-7536-a75c3b42","source":"https://github.com/imagemagick/imagemagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176","signature_type":"Function","signature_version":"v1","digest":{"length":1863,"function_hash":"255278473785869605660381817662295164824"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}