{"id":"CVE-2017-11448","details":"The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.","modified":"2026-04-11T03:56:50.513679Z","published":"2017-07-19T07:29:00.517Z","related":["SUSE-SU-2018:0486-1","SUSE-SU-2018:0524-1","SUSE-SU-2018:0581-1"],"references":[{"type":"FIX","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867893"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/556"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"9871b4ad7400606bbecf7f979b198080f4b107c3"},{"fixed":"f6463ca9588579633bbaed9460899d892aa3c64a"}],"database_specific":{"versions":[{"introduced":"7.0.0-0"},{"fixed":"7.0.6-1"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"19858ec47b7aa6890efbaa1a1d40fde51afb8db3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.9-0"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T03:56:50Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-11448.json","vanir_signatures":[{"target":{"file":"coders/jpeg.c"},"source":"https://github.com/imagemagick/imagemagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a","id":"CVE-2017-11448-994d6970","signature_type":"Line","signature_version":"v1","digest":{"line_hashes":["288340643851083288068732422050688800702","181053126738692830530665237417963593398","43169221445519691339275548518117328776","249197958644992025781095410143706291273"],"threshold":0.9},"deprecated":false},{"target":{"file":"coders/jpeg.c","function":"ReadJPEGImage"},"source":"https://github.com/imagemagick/imagemagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a","id":"CVE-2017-11448-d626b4af","signature_type":"Function","signature_version":"v1","digest":{"length":12820,"function_hash":"71821617886458479043669353458635460276"},"deprecated":false}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}