{"id":"CVE-2017-15277","details":"ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.","modified":"2026-04-16T06:21:07.412912096Z","published":"2017-10-12T08:29:00.290Z","related":["SUSE-SU-2018:0017-1","SUSE-SU-2018:0043-1","SUSE-SU-2018:0197-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4232-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3681-1/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4032"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4040"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4321"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/592"},{"type":"EVIDENCE","url":"https://github.com/neex/gifoeb"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ImageMagick/ImageMagick","events":[{"introduced":"0"},{"last_affected":"9871b4ad7400606bbecf7f979b198080f4b107c3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.6-1"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"9fd10cf630832b36a588c1545d8736539b2f1fb5"}]}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1"],"database_specific":{"vanir_signatures_modified":"2026-04-11T04:38:12Z","vanir_signatures":[{"target":{"file":"coders/gif.c"},"id":"CVE-2017-15277-18d632c1","signature_type":"Line","deprecated":false,"digest":{"line_hashes":["306973232245618165981768373290104851468","125207226614535232036573969069490306158","29907257949769001391588402564807748975","314517929402371445594822948285256751638"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5","signature_version":"v1"},{"target":{"function":"ReadGIFImage","file":"coders/gif.c"},"id":"CVE-2017-15277-ec5bd8a7","signature_type":"Function","deprecated":false,"digest":{"length":9760,"function_hash":"295666413879762265196560470791931146085"},"source":"https://github.com/imagemagick/imagemagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5","signature_version":"v1"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.3.26"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15277.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}