{"id":"CVE-2017-18209","details":"In the GetOpenCLCachedFilesDirectory function in magick/opencl.c in ImageMagick 7.0.7, a NULL pointer dereference vulnerability occurs because a memory allocation result is not checked, related to GetOpenCLCacheDirectory.","modified":"2026-04-02T00:09:19.402678Z","published":"2018-03-01T21:29:00.220Z","related":["SUSE-SU-2018:0857-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103218"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/790"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"last_affected":"27f8ba82ddd665ab41cef6588128f680cbd69905"},{"introduced":"0"},{"last_affected":"b601ab2f2e355350b14ca72753684cbeeef7ffcf"},{"introduced":"0"},{"last_affected":"2460488112c34711473f50e16566494155d8e6ef"},{"introduced":"0"},{"last_affected":"78684928670347f8229905d3487f3208e3ebe289"},{"introduced":"0"},{"last_affected":"dcd5a5fed62ec861b955bd3da1d6f5592486c05a"},{"introduced":"0"},{"last_affected":"908258552716d029a6119c34de2350344720d405"},{"introduced":"0"},{"last_affected":"fcebe0ec85a9f532a6108efc08f0fad1a6df83f0"},{"introduced":"0"},{"last_affected":"8910f12f08e614a150fd8d717df5170c8c9e8a4b"},{"introduced":"0"},{"last_affected":"b964b20847be9015699bdb59b6431cf1101806ad"},{"introduced":"0"},{"last_affected":"7be0c046e2cfa5d1c97c4185137697b4617c882c"},{"introduced":"0"},{"last_affected":"315d854ad367b89f0e62b107fb9a9dda1a7659a0"},{"introduced":"0"},{"last_affected":"2884ed8a622c4b5678d1083fcaf0530ea3d58c7a"},{"introduced":"0"},{"last_affected":"ccc3afcfc93d5b421893d1da1cdae29908fc8dd1"},{"introduced":"0"},{"last_affected":"aba94de64e1423b5a3daa6178b04e6d22c839faf"},{"introduced":"0"},{"last_affected":"e017264a99f7621a5a7556454a2a6db43f8a45c3"},{"introduced":"0"},{"last_affected":"ddbf0ed10323d0fb329189041190630a8f7af5a7"},{"introduced":"0"},{"last_affected":"c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3"},{"introduced":"0"},{"last_affected":"652508e718a196c629fd97e465239d1ae52b2f23"},{"introduced":"0"},{"last_affected":"93b85201f22d0fb0b03f3f3e0d82c96c2bc103d1"},{"introduced":"0"},{"last_affected":"311157f0b67f4ccc85b3219f49db4f6d5277bd8e"},{"introduced":"0"},{"last_affected":"f39bfc52683755b50c83f3be693982a3bdb250fe"},{"introduced":"0"},{"last_affected":"b11a66975b900b3eb524360588edb15506290004"},{"introduced":"0"},{"last_affected":"3278fc22854db6236bcac95c963f0460b247a778"},{"introduced":"0"},{"last_affected":"d0c7deb7a2a4801ebfd589b33744294116f8873c"},{"introduced":"0"},{"last_affected":"009e5556dac88bcbb1aef80907747793299c30a6"},{"introduced":"0"},{"last_affected":"e12602b39b5e778240d286b6f9bbbc0fe3fb26c5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.7-0"},{"introduced":"0"},{"last_affected":"7.0.7-1"},{"introduced":"0"},{"last_affected":"7.0.7-2"},{"introduced":"0"},{"last_affected":"7.0.7-3"},{"introduced":"0"},{"last_affected":"7.0.7-4"},{"introduced":"0"},{"last_affected":"7.0.7-5"},{"introduced":"0"},{"last_affected":"7.0.7-6"},{"introduced":"0"},{"last_affected":"7.0.7-8"},{"introduced":"0"},{"last_affected":"7.0.7-9"},{"introduced":"0"},{"last_affected":"7.0.7-10"},{"introduced":"0"},{"last_affected":"7.0.7-11"},{"introduced":"0"},{"last_affected":"7.0.7-12"},{"introduced":"0"},{"last_affected":"7.0.7-13"},{"introduced":"0"},{"last_affected":"7.0.7-14"},{"introduced":"0"},{"last_affected":"7.0.7-15"},{"introduced":"0"},{"last_affected":"7.0.7-16"},{"introduced":"0"},{"last_affected":"7.0.7-17"},{"introduced":"0"},{"last_affected":"7.0.7-18"},{"introduced":"0"},{"last_affected":"7.0.7-19"},{"introduced":"0"},{"last_affected":"7.0.7-20"},{"introduced":"0"},{"last_affected":"7.0.7-21"},{"introduced":"0"},{"last_affected":"7.0.7-22"},{"introduced":"0"},{"last_affected":"7.0.7-23"},{"introduced":"0"},{"last_affected":"7.0.7-24"},{"introduced":"0"},{"last_affected":"7.0.7-25"},{"introduced":"0"},{"last_affected":"7.0.7.7"}]}}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-18209.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}