{"id":"CVE-2017-16353","details":"GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.","modified":"2026-03-15T22:15:23.200816Z","published":"2017-11-01T15:29:00.227Z","related":["SUSE-SU-2018:0857-1","SUSE-SU-2018:0864-1","SUSE-SU-2018:0880-1"],"references":[{"type":"WEB","url":"http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=e4e1c2a581d8"},{"type":"WEB","url":"https://usn.ubuntu.com/4232-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101653"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4321"},{"type":"ADVISORY","url":"ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html"},{"type":"EVIDENCE","url":"https://blogs.securiteam.com/index.php/archives/3494"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/43111/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.3.26"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-16353.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}