PatchSiren cyber security CVE debrief
CVE-2016-10065 Imagemagick CVE debrief
CVE-2016-10065 affects ImageMagick's VIFF image parsing path, specifically ReadVIFFImage in coders/viff.c. A crafted file can trigger a denial of service, and the NVD record also notes other unspecified impact. The CVE was publicly disclosed on 2017-03-03 and is rated High by NVD.
- Vendor
- Imagemagick
- Product
- CVE-2016-10065
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-03
- Advisory updated
- 2026-05-13
Who should care
Administrators, platform owners, and developers who use ImageMagick to process untrusted image files should care most, especially in upload, conversion, preview, or batch-processing workflows.
Technical summary
The supplied description says ReadVIFFImage in ImageMagick before 7.0.1-0 can be triggered by a crafted file to cause an application crash or other unspecified impact. NVD also lists ImageMagick versions through 6.9.7-10 as vulnerable in its CPE criteria, and includes openSUSE Leap 42.1 as affected. The NVD CVSS 3.0 vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, and NVD classifies the issue as CWE-284. One important nuance in the record: the description says "remote attackers," while the CVSS vector indicates local access and user interaction are required.
Defensive priority
High. Patch ImageMagick promptly wherever it processes untrusted files, and verify that downstream or vendor-packaged builds include the fix. Systems that accept user-supplied image content or automate file conversion deserve the fastest attention because the NVD vector requires local/user-interaction conditions rather than broad unauthenticated network exposure.
Recommended defensive actions
- Upgrade ImageMagick to 7.0.1-0 or a vendor-backported build that includes the fix.
- Inventory all systems, containers, and applications that use ImageMagick, including packaged distro builds, and confirm they are not on affected versions.
- Prioritize patching for upload, preview, conversion, and batch-processing services that accept user-supplied image files.
- Verify that downstream security updates were actually applied, especially where vendor advisories or distro patches are used instead of upstream releases.
- Monitor for crashes or abnormal failures in ImageMagick-based workflows until patched, and treat malformed VIFF files as suspicious input.
Evidence notes
This debrief is grounded in the official CVE/NVD record and the linked references in the supplied corpus. The NVD entry provides the CVSS vector, affected-version criteria, and CWE classification, while the linked upstream GitHub commit and issue tracker entry indicate a patch and discussion path. Additional vendor-adjacent references include the openSUSE update notice, the Red Hat bug, and the oss-security mailing list post. No exploit code or unsupported claims are included.
Official resources
-
CVE-2016-10065 CVE record
CVE.org
-
CVE-2016-10065 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
Publicly disclosed on 2017-03-03 per the supplied CVE/NVD record. The NVD record was last modified on 2026-05-13; that is a record update date, not the original disclosure date.