{"id":"CVE-2016-7536","details":"magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.","modified":"2026-04-10T04:47:01.165908Z","published":"2017-04-20T18:59:01.437Z","related":["CGA-v228-x2r8-gq5m"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93225"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378772"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545367"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/130"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/09/22/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"02dadf116124cfba35d7ebd9ced3e5ad0be0f176"},{"fixed":"478cce544fdf1de882d78381768458f397964453"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"4bae9bed8a79e031884ca9a4681dce89dbd26855"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.4-0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7536.json","vanir_signatures_modified":"2026-04-10T04:47:01Z","vanir_signatures":[{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"37050166569566636881308913669939820798","length":1873},"source":"https://github.com/imagemagick/imagemagick/commit/478cce544fdf1de882d78381768458f397964453","id":"CVE-2016-7536-46c8ffc1","signature_type":"Function","target":{"file":"magick/profile.c","function":"WriteTo8BimProfile"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["122791646321954844747171237639594463691","267082534527191666955084411774895493083","106386253077854813831797588485624939567","320726689913827354715295875061720204477"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/478cce544fdf1de882d78381768458f397964453","id":"CVE-2016-7536-4f037a63","signature_type":"Line","target":{"file":"magick/profile.c"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["122791646321954844747171237639594463691","267082534527191666955084411774895493083","106386253077854813831797588485624939567","320726689913827354715295875061720204477"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176","id":"CVE-2016-7536-92363b33","signature_type":"Line","target":{"file":"MagickCore/profile.c"}},{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"255278473785869605660381817662295164824","length":1863},"source":"https://github.com/imagemagick/imagemagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176","id":"CVE-2016-7536-a75c3b42","signature_type":"Function","target":{"file":"MagickCore/profile.c","function":"WriteTo8BimProfile"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}