{"id":"CVE-2016-7799","details":"MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.","modified":"2026-04-16T06:21:45.195247501Z","published":"2017-01-18T17:59:00.730Z","related":["SUSE-SU-2016:2667-1","SUSE-SU-2016:2964-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3726"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93264"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-21"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/01/4"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/01/6"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/280"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"ebaa1ec6e56b04ea7b625f2eb28957d3bf9d75d8"},{"fixed":"a7bb158b7bedd1449a34432feb3a67c8f1873bfa"}],"database_specific":{"versions":[{"introduced":"7.0.0-0"},{"fixed":"7.0.3-2"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"0c17e3bd00f61f730240571010d905766622e0c7"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.6-0"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1"],"database_specific":{"vanir_signatures_modified":"2026-04-11T05:00:55Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7799.json","vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["55538535849838087017497805556919473556","261128923802723148554592281260328158853","16546488639457447087166482182796893989","113630145063465390056385546323268763450"]},"deprecated":false,"target":{"file":"MagickCore/profile.c"},"source":"https://github.com/imagemagick/imagemagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa","signature_version":"v1","signature_type":"Line","id":"CVE-2016-7799-43eed044"},{"digest":{"function_hash":"160235545997546523496287174794181439555","length":3572},"deprecated":false,"target":{"file":"MagickCore/profile.c","function":"SyncExifProfile"},"source":"https://github.com/imagemagick/imagemagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa","signature_version":"v1","signature_type":"Function","id":"CVE-2016-7799-aee00c44"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}