{"id":"CVE-2016-7540","details":"coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.","modified":"2026-04-01T23:54:40.277386Z","published":"2017-04-20T18:59:01.530Z","related":["SUSE-SU-2016:2667-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93228"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1594060"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/09/22/2"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378777"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/pull/223"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"last_affected":"ac6fdfbc6a3cbd157ddf4be79c28e41eeb8f5e03"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.9.4-9"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.10-0","7.0.10-1","7.0.10-10","7.0.10-11","7.0.10-12","7.0.10-13","7.0.10-14","7.0.10-15","7.0.10-16","7.0.10-17","7.0.10-18","7.0.10-19","7.0.10-2","7.0.10-20","7.0.10-21","7.0.10-22","7.0.10-23","7.0.10-24","7.0.10-25","7.0.10-26","7.0.10-27","7.0.10-28","7.0.10-29","7.0.10-3","7.0.10-30","7.0.10-31","7.0.10-32","7.0.10-33","7.0.10-34","7.0.10-35","7.0.10-36","7.0.10-37","7.0.10-38","7.0.10-39","7.0.10-4","7.0.10-40","7.0.10-41","7.0.10-42","7.0.10-43","7.0.10-44","7.0.10-45","7.0.10-46","7.0.10-47","7.0.10-48","7.0.10-49","7.0.10-5","7.0.10-50","7.0.10-51","7.0.10-52","7.0.10-53","7.0.10-54","7.0.10-55","7.0.10-56","7.0.10-57","7.0.10-58","7.0.10-59","7.0.10-6","7.0.10-60","7.0.10-61","7.0.10-62","7.0.10-7","7.0.10-8","7.0.10-9","7.0.11-0","7.0.11-1","7.0.11-10","7.0.11-11","7.0.11-12","7.0.11-13","7.0.11-14","7.0.11-2","7.0.11-3","7.0.11-4","7.0.11-5","7.0.11-6","7.0.11-7","7.0.11-8","7.0.11-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0","7.0.7-1","7.0.7-10","7.0.7-11","7.0.7-12","7.0.7-13","7.0.7-14","7.0.7-15","7.0.7-16","7.0.7-17","7.0.7-18","7.0.7-19","7.0.7-2","7.0.7-20","7.0.7-21","7.0.7-22","7.0.7-23","7.0.7-24","7.0.7-25","7.0.7-26","7.0.7-27","7.0.7-28","7.0.7-29","7.0.7-3","7.0.7-30","7.0.7-31","7.0.7-32","7.0.7-33","7.0.7-34","7.0.7-35","7.0.7-36","7.0.7-37","7.0.7-38","7.0.7-39","7.0.7-4","7.0.7-5","7.0.7-6","7.0.7-8","7.0.7-9","7.0.7.7","7.0.8-0","7.0.8-1","7.0.8-10","7.0.8-11","7.0.8-12","7.0.8-13","7.0.8-14","7.0.8-15","7.0.8-16","7.0.8-17","7.0.8-18","7.0.8-19","7.0.8-2","7.0.8-20","7.0.8-21","7.0.8-22","7.0.8-23","7.0.8-24","7.0.8-25","7.0.8-26","7.0.8-27","7.0.8-28","7.0.8-29","7.0.8-3","7.0.8-30","7.0.8-31","7.0.8-32","7.0.8-33","7.0.8-34","7.0.8-35","7.0.8-36","7.0.8-37","7.0.8-38","7.0.8-39","7.0.8-4","7.0.8-40","7.0.8-41","7.0.8-42","7.0.8-43","7.0.8-44","7.0.8-45","7.0.8-46","7.0.8-47","7.0.8-48","7.0.8-49","7.0.8-5","7.0.8-50","7.0.8-51","7.0.8-52","7.0.8-53","7.0.8-54","7.0.8-55","7.0.8-56","7.0.8-57","7.0.8-58","7.0.8-59","7.0.8-6","7.0.8-60","7.0.8-61","7.0.8-62","7.0.8-63","7.0.8-64","7.0.8-65","7.0.8-66","7.0.8-67","7.0.8-68","7.0.8-7","7.0.8-8","7.0.8-9","7.0.9-0","7.0.9-1","7.0.9-10","7.0.9-11","7.0.9-12","7.0.9-13","7.0.9-14","7.0.9-15","7.0.9-16","7.0.9-17","7.0.9-18","7.0.9-19","7.0.9-2","7.0.9-20","7.0.9-21","7.0.9-22","7.0.9-23","7.0.9-24","7.0.9-25","7.0.9-26","7.0.9-27","7.0.9-4","7.0.9-5","7.0.9-6","7.0.9-7","7.0.9-8","7.0.9-9","7.1.0-0","7.1.0-1","7.1.0-10","7.1.0-11","7.1.0-12","7.1.0-13","7.1.0-14","7.1.0-15","7.1.0-16","7.1.0-17","7.1.0-18","7.1.0-19","7.1.0-2","7.1.0-20","7.1.0-21","7.1.0-22","7.1.0-23","7.1.0-24","7.1.0-25","7.1.0-26","7.1.0-27","7.1.0-28","7.1.0-29","7.1.0-3","7.1.0-30","7.1.0-31","7.1.0-32","7.1.0-33","7.1.0-34","7.1.0-35","7.1.0-36","7.1.0-37","7.1.0-38","7.1.0-39","7.1.0-4","7.1.0-40","7.1.0-41","7.1.0-42","7.1.0-43","7.1.0-44","7.1.0-45","7.1.0-46","7.1.0-47","7.1.0-48","7.1.0-49","7.1.0-5","7.1.0-50","7.1.0-51","7.1.0-52","7.1.0-53","7.1.0-54","7.1.0-55","7.1.0-56","7.1.0-57","7.1.0-58","7.1.0-59","7.1.0-6","7.1.0-60","7.1.0-61","7.1.0-62","7.1.0-7","7.1.0-8","7.1.0-9","7.1.1-0","7.1.1-1","7.1.1-10","7.1.1-11","7.1.1-12","7.1.1-13","7.1.1-14","7.1.1-15","7.1.1-16","7.1.1-17","7.1.1-18","7.1.1-19","7.1.1-2","7.1.1-20","7.1.1-21","7.1.1-22","7.1.1-23","7.1.1-24","7.1.1-25","7.1.1-26","7.1.1-27","7.1.1-28","7.1.1-29","7.1.1-3","7.1.1-30","7.1.1-31","7.1.1-32","7.1.1-33","7.1.1-34","7.1.1-35","7.1.1-36","7.1.1-37","7.1.1-38","7.1.1-39","7.1.1-4","7.1.1-40","7.1.1-41","7.1.1-43","7.1.1-44","7.1.1-45","7.1.1-46","7.1.1-47","7.1.1-5","7.1.1-6","7.1.1-7","7.1.1-8","7.1.1-9","7.1.2-0","7.1.2-1","7.1.2-10","7.1.2-11","7.1.2-12","7.1.2-13","7.1.2-14","7.1.2-15","7.1.2-16","7.1.2-17","7.1.2-18","7.1.2-2","7.1.2-3","7.1.2-5","7.1.2-6","7.1.2-7","7.1.2-8","7.1.2-9"],"database_specific":{"vanir_signatures":[{"id":"CVE-2016-7540-0f3936c2","signature_type":"Function","digest":{"length":1705,"function_hash":"12049306930972900207546801341701970175"},"source":"https://github.com/imagemagick/imagemagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7","deprecated":false,"target":{"function":"WriteRGFImage","file":"coders/rgf.c"},"signature_version":"v1"},{"id":"CVE-2016-7540-bff98ddb","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["152325804923714907420968470529836421804","84301424894650318138066432171020510919","234922387320644358258213245342217358358","51442785406918849293590780145967866940","251438074872774134997583560468472281442","167803181383194225235087899938848609593","200901111645146455814300289342525793978","40075768361917823915384989034006703201","308808076207351079082644637064443533100","254324701600787937099010276317098783018","227827563996924995911966050103663540646","109732373276114927693704197373493646527","138390208596809178300399574284595220928","182649730746032925946507893592489575563","38473390972515348214488420349512980212","201665080610914159273620449077432595811","262275178370304367782308947148888410662","156538146669394591143662375432191019587","72626647418135403540226924215892263434"]},"source":"https://github.com/imagemagick/imagemagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7","deprecated":false,"target":{"file":"coders/rgf.c"},"signature_version":"v1"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7540.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}