{"id":"CVE-2016-9556","details":"The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.","modified":"2026-04-16T01:39:45.300730971Z","published":"2017-03-23T18:59:01.100Z","related":["SUSE-SU-2016:3256-1","SUSE-SU-2016:3258-1","SUSE-SU-2017:0305-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3726"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/23/1"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/01/4"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/02/12"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94492"},{"type":"ADVISORY","url":"https://blogs.gentoo.org/ago/2016/11/19/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1398198"},{"type":"ADVISORY","url":"https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1398198"},{"type":"REPORT","url":"https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/11/23/1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/12/01/4"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/12/02/12"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99"}]}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"function":"ReadSGIImage","file":"coders/sgi.c"},"signature_type":"Function","source":"https://github.com/imagemagick/imagemagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99","id":"CVE-2016-9556-6914da3d","signature_version":"v1","digest":{"function_hash":"320932621590700566942648456387954414978","length":11330}},{"id":"CVE-2016-9556-a1b09a93","digest":{"line_hashes":["158914192519834743046715997327546238955","247723800267508866142098066814654315147","306954479034000166329109854572178577949","298672604460329150479975648851281235336"],"threshold":0.9},"signature_type":"Line","source":"https://github.com/imagemagick/imagemagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99","target":{"file":"coders/sgi.c"},"signature_version":"v1","deprecated":false}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9556.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}