PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7799 Imagemagick CVE debrief

CVE-2016-7799 is a denial-of-service issue in ImageMagick’s MagickCore/profile.c. According to NVD, a crafted file can trigger an out-of-bounds read, and the impact is availability-only. The CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, which means an attacker can deliver the malicious file remotely, but a user must interact with it for the vulnerable code path to run. NVD lists affected ImageMagick versions before 7.0.3-2, and also identifies vulnerable 6.x releases before 6.9.6-0.

Vendor
Imagemagick
Product
CVE-2016-7799
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-18
Original CVE updated
2026-05-13
Advisory published
2017-01-18
Advisory updated
2026-05-13

Who should care

Administrators, developers, and package maintainers who deploy ImageMagick or applications that parse untrusted images or profiles. Risk is highest where image uploads, email attachments, document conversion, or automated thumbnailing pipelines process attacker-controlled files.

Technical summary

The issue is classified by NVD as CWE-125 (out-of-bounds read). The vulnerable path is in MagickCore/profile.c, where handling a crafted file can cause ImageMagick to read beyond intended bounds and crash or otherwise deny service. NVD’s CVSS data indicates no confidentiality or integrity impact, but high availability impact. The published vulnerability criteria include ImageMagick versions before 7.0.3-2, and NVD also lists 6.x versions prior to 6.9.6-0 as vulnerable.

Defensive priority

Medium. The vulnerability is remote-triggerable but requires user interaction, and the primary impact is denial of service rather than code execution or data loss. It should still be prioritized for systems that ingest untrusted images automatically or at scale.

Recommended defensive actions

  • Upgrade ImageMagick to a fixed release at or beyond 7.0.3-2, or to the appropriate patched version for your maintained branch.
  • If you maintain a 6.x line, verify that your package or vendor build includes a fix consistent with NVD’s vulnerable-range cutoff before 6.9.6-0.
  • Review image-processing workflows that accept untrusted files, including upload, preview, conversion, and thumbnail services.
  • Limit exposure by isolating image-processing services and applying least-privilege execution where feasible.
  • Confirm your distribution or vendor package has incorporated the fix, especially if you rely on backported security updates.

Evidence notes

The core facts come from the official CVE/NVD record: the description names MagickCore/profile.c, the out-of-bounds read, and the remote denial-of-service impact. NVD also supplies the CWE-125 classification, the CVSS 3.1 vector, and vulnerable-version criteria for ImageMagick before 7.0.3-2, plus 6.x ranges ending before 6.9.6-0. The linked GitHub commit and issue references are included as patch/issue-tracking context in the source corpus.

Official resources

Publicly disclosed on 2017-01-18, matching the CVE published date in the supplied timeline. The 2026-05-13 modified date is a record update time and not the original disclosure date.