{"id":"CVE-2016-10144","details":"coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.","modified":"2026-04-10T04:57:31.373937Z","published":"2017-03-24T15:59:00.403Z","related":["CGA-f2p8-vrvq-vp74","MGASA-2018-0229","SUSE-SU-2017:0529-1","SUSE-SU-2017:0586-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3799"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95750"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-09"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/16/6"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/17/5"},{"type":"FIX","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"97566cf2806c0a5a86e884c96831a0c3b1ec6c20"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"9f41b151520e5ac59298fc831b7efe1698889d5a"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.7-1"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10144.json","vanir_signatures":[{"signature_type":"Line","id":"CVE-2016-10144-37612081","digest":{"threshold":0.9,"line_hashes":["122695229940946027370903610164804386434","158272345799333140035533901066760344811","270366971180648660412229462214101171990","260159635337769096771964151139554243837"]},"deprecated":false,"target":{"file":"coders/ipl.c"},"source":"https://github.com/imagemagick/imagemagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20","signature_version":"v1"},{"signature_type":"Function","id":"CVE-2016-10144-704db7e7","digest":{"length":4517,"function_hash":"285246464857046053145747533854934586069"},"deprecated":false,"target":{"file":"coders/ipl.c","function":"WriteIPLImage"},"source":"https://github.com/imagemagick/imagemagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20","signature_version":"v1"}],"vanir_signatures_modified":"2026-04-10T04:57:31Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}