{"id":"CVE-2017-13768","details":"Null Pointer Dereference in the IdentifyImage function in MagickCore/identify.c in ImageMagick through 7.0.6-10 allows an attacker to perform denial of service by sending a crafted image file.","modified":"2026-04-16T06:17:04.131397985Z","published":"2017-08-30T09:29:00.560Z","related":["SUSE-SU-2018:0857-1","SUSE-SU-2018:0880-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100569"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201711-07"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/706"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"2f74aa6457d35e511175b1f86b80012d5d4751c7"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.9-11"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","6.9.9-0","6.9.9-1","6.9.9-10","6.9.9-2","6.9.9-3","6.9.9-4","6.9.9-5","6.9.9-6","6.9.9-7","6.9.9-8","6.9.9-9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"7.0.0-0"},{"last_affected":"7.0.6-10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}],"vanir_signatures_modified":"2026-04-11T04:47:38Z","vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["201574829055882073682823747988023744741","281411365007837298567174748174081729524","187434976871069825458001900389895480189","37033304517079638609531138597618694606"]},"signature_version":"v1","signature_type":"Line","target":{"file":"coders/jp2.c"},"id":"CVE-2017-13768-28ea5f26","source":"https://github.com/imagemagick/imagemagick6/commit/2f74aa6457d35e511175b1f86b80012d5d4751c7","deprecated":false},{"digest":{"length":7262,"function_hash":"258707320293750171487029545559793909725"},"signature_version":"v1","target":{"function":"WriteJP2Image","file":"coders/jp2.c"},"signature_type":"Function","id":"CVE-2017-13768-54186a86","source":"https://github.com/imagemagick/imagemagick6/commit/2f74aa6457d35e511175b1f86b80012d5d4751c7","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-13768.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}