{"id":"CVE-2017-5511","details":"coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.","modified":"2026-05-18T09:59:06.416214Z","published":"2017-03-24T15:59:01.217Z","related":["CGA-r2jr-5pfg-8g66","SUSE-SU-2017:0518-1","SUSE-SU-2017:0529-1","SUSE-SU-2017:0586-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3799"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95746"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-09"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/16/6"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/17/5"},{"type":"FIX","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851374"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/347"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"80973288d5cb3fd6165a7ac3e2e88344229bf465"},{"fixed":"7d65a814ac76bd04760072c33e452371692ee790"},{"fixed":"c8c6a0f123d5e35c173125365c97e2c0fc7eca42"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"extracted_events":[{"introduced":"7.0.0-0"},{"fixed":"7.0.4-3"}],"cpe":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"}}],"versions":["7.0.4-2","7.0.4-1","7.0.4-0","7.0.3-10","7.0.3-9","7.0.3-8","7.0.3-7","7.0.3-6","7.0.3-5","7.0.3-4","7.0.3-3","7.0.3-2","7.0.3-1","7.0.3-0","7.0.2-10","7.0.2-9","7.0.2-8","7.0.2-7","7.0.2-6","7.0.2-5","7.0.2-4","7.0.2-3","7.0.2-2","7.0.2-1","7.0.2-0","7.0.1-10","7.0.1-9","7.0.1-8","7.0.1-7","7.0.1-6","7.0.1-5","7.0.1-4","7.0.1-3","7.0.1-2","7.0.1-1","7.0.1-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5511.json","vanir_signatures":[{"source":"https://github.com/imagemagick/imagemagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42","id":"CVE-2017-5511-830384aa","signature_type":"Function","digest":{"length":9561,"function_hash":"207190205193003344134843830923205533082"},"target":{"file":"coders/psd.c","function":"ReadPSDLayers"},"signature_version":"v1","deprecated":false},{"source":"https://github.com/imagemagick/imagemagick/commit/7d65a814ac76bd04760072c33e452371692ee790","id":"CVE-2017-5511-a21e37ff","signature_type":"Line","digest":{"line_hashes":["55333466805757615948444201931126478586","258270942984056464144309545899758896064","181448018341567449197984181109794542604","119621760174390715003956062007110637088"],"threshold":0.9},"target":{"file":"coders/psd.c"},"signature_version":"v1","deprecated":false},{"source":"https://github.com/imagemagick/imagemagick/commit/7d65a814ac76bd04760072c33e452371692ee790","id":"CVE-2017-5511-ab77d3ba","signature_type":"Function","digest":{"length":9546,"function_hash":"318264408446617041452145003355556413784"},"target":{"file":"coders/psd.c","function":"ReadPSDLayers"},"signature_version":"v1","deprecated":false},{"source":"https://github.com/imagemagick/imagemagick/commit/c8c6a0f123d5e35c173125365c97e2c0fc7eca42","id":"CVE-2017-5511-b048e104","signature_type":"Line","digest":{"line_hashes":["55333466805757615948444201931126478586","258270942984056464144309545899758896064","181448018341567449197984181109794542604","119621760174390715003956062007110637088"],"threshold":0.9},"target":{"file":"coders/psd.c"},"signature_version":"v1","deprecated":false}],"vanir_signatures_modified":"2026-05-18T09:59:06Z"}},{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"42b46010047f45e5ccee3f3da5b5b21728a38566"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"6.9.7-3"}],"cpe":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"}}],"versions":["6.9.7-2","6.9.7-1","6.9.7-0","6.9.6-8","6.9.6-7","6.9.6-6","6.9.6-5","6.9.6-4","6.9.6-3","6.9.6-2","6.9.6-1","6.9.6-0","6.9.5-10","6.9.5-9","6.9.5-8","6.9.5-7","6.9.5-6","6.9.5-5","6.9.5-4","6.9.5-3","6.9.5-2","6.9.5-1","6.9.5-0","6.9.4-10","6.9.4-9","6.9.4-8","6.9.4-7","6.9.4-6","6.9.4-5","6.9.4-4","6.9.4-3","6.9.4-2","6.9.4-1","6.9.4-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5511.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}