{"id":"CVE-2017-5509","details":"coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.","modified":"2026-04-16T06:18:32.148260285Z","published":"2017-03-24T15:59:01.123Z","related":["CGA-9mcv-wrc2-wfmr"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-09"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95751"},{"type":"REPORT","url":"https://github.com/ImageMagick/ImageMagick/commit/37a1710e2dab6ed91128ea648d654a22fbe2a6af"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/d4ec73f866a7c42a2e7f301fcd696e5cb7a7d3ab"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/350"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/16/6"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/17/5"},{"type":"FIX","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851377"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"74390c5db097bf7ac36f1cfc5f3128b84ff14ebe"},{"fixed":"37a1710e2dab6ed91128ea648d654a22fbe2a6af"},{"fixed":"d4ec73f866a7c42a2e7f301fcd696e5cb7a7d3ab"}],"database_specific":{"versions":[{"introduced":"7.0.0-0"},{"fixed":"7.0.4-4"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"e30fc4fe77d061519b033d7c3bcd855211c266b3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.7-4"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-2","6.9.7-3","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-2","7.0.4-3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5509.json","vanir_signatures_modified":"2026-04-11T04:59:41Z","vanir_signatures":[{"digest":{"line_hashes":["336211192258357190603469980101580089994","296244306347787263434744052393603832094","57208146108575333041261661953592003404","116144307006127234263309756238830063080","139223027227843733679023142550900939962","183433408163860545283281992858008601577","178844290491419827073598675740037435641","127084790685226935238971641782738643838","12967733801060672076068679033799560585","302124041839141366287166381748763376727","4100895761094521673359867979468405278","197417135551119444380214994425598642189","297892445550040779104998041155930046398","182754273353944415830947089929975613988","299617680353668312582936765648886243473","211077287007386895570863384026399933366","283696664996473525351965052797472904106","17679479552935500920202540103139950896","74275001935591817667499739660070824772"],"threshold":0.9},"signature_version":"v1","target":{"file":"coders/psd.c"},"source":"https://github.com/imagemagick/imagemagick/commit/d4ec73f866a7c42a2e7f301fcd696e5cb7a7d3ab","deprecated":false,"signature_type":"Line","id":"CVE-2017-5509-089e9f2e"},{"digest":{"line_hashes":["282963121812071701153611144534227120945","136305309699279039720614934154354507178","240933101706253584364780747854733369151","183547654563170034629395333660984007859"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/37a1710e2dab6ed91128ea648d654a22fbe2a6af","signature_version":"v1","target":{"file":"coders/psd.c"},"deprecated":false,"signature_type":"Line","id":"CVE-2017-5509-d1d020bc"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}