{"id":"CVE-2017-12643","details":"ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\\png.c.","modified":"2026-04-11T04:47:23.086013Z","published":"2017-08-07T15:29:00.423Z","related":["SUSE-SU-2018:0349-1","SUSE-SU-2018:0350-1","SUSE-SU-2018:0413-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100218"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/d9ccd8227c4c88a907cda5278408b73552cb0c07"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/549"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"last_affected":"9871b4ad7400606bbecf7f979b198080f4b107c3"},{"fixed":"d9ccd8227c4c88a907cda5278408b73552cb0c07"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.6-1"}]}}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/imagemagick/imagemagick/commit/d9ccd8227c4c88a907cda5278408b73552cb0c07","target":{"function":"ReadOneJNGImage","file":"coders/png.c"},"signature_version":"v1","digest":{"function_hash":"236916887990210647631213773343813750246","length":14021},"id":"CVE-2017-12643-45cb1df4","deprecated":false,"signature_type":"Function"},{"source":"https://github.com/imagemagick/imagemagick/commit/d9ccd8227c4c88a907cda5278408b73552cb0c07","target":{"function":"ReadOneMNGImage","file":"coders/png.c"},"signature_version":"v1","digest":{"function_hash":"14752931569980073394784456081876890468","length":46785},"id":"CVE-2017-12643-c0f99537","deprecated":false,"signature_type":"Function"},{"source":"https://github.com/imagemagick/imagemagick/commit/d9ccd8227c4c88a907cda5278408b73552cb0c07","target":{"file":"coders/png.c"},"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["265440451045956457731026798407789602809","79519851578672563808845480318032307392","270938159120395691492556393514530828862","171853395571028274488449297369259530392","265440451045956457731026798407789602809","263388957291619944839097022246535852055","270938159120395691492556393514530828862","171853395571028274488449297369259530392","255612868579660011794490102239201310145","189752630443036866650888949279665783213","235776829183873996185536137474914945649","132604844669900544833523755852710740552","108523780531269009496467286403460853297"]},"id":"CVE-2017-12643-fac2f870","deprecated":false,"signature_type":"Line"}],"vanir_signatures_modified":"2026-04-11T04:47:23Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12643.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}