{"id":"CVE-2017-5506","details":"Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.","modified":"2026-05-14T04:02:41.091562960Z","published":"2017-03-24T15:59:00.967Z","related":["CGA-qx23-r4wx-fppj","SUSE-SU-2017:0529-1","SUSE-SU-2017:0586-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3799"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95753"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-09"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/16/6"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/17/5"},{"type":"FIX","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851383"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/9a069e0f2e027ec5138f998023cf9cb62c04889f"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/354"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"9a069e0f2e027ec5138f998023cf9cb62c04889f"}],"database_specific":{"source":"REFERENCES"}}],"versions":["7.0.4-3","7.0.4-2","7.0.4-1","7.0.4-0","7.0.3-10","7.0.3-9","7.0.3-8","7.0.3-7","7.0.3-6","7.0.3-5","7.0.3-4","7.0.3-3","7.0.3-2","7.0.3-1","7.0.3-0","7.0.2-10","7.0.2-9","7.0.2-8","7.0.2-7","7.0.2-6","7.0.2-5","7.0.2-4","7.0.2-3","7.0.2-2","7.0.2-1","7.0.2-0","7.0.1-10","7.0.1-9","7.0.1-8","7.0.1-7","7.0.1-6","7.0.1-5","7.0.1-4","7.0.1-3","7.0.1-2","7.0.1-1","7.0.1-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5506.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}