PatchSiren cyber security CVE debrief
CVE-2016-8700 Potrace Project CVE debrief
CVE-2016-8700 is a high-severity memory corruption issue in potrace’s BMP parsing path. The vulnerability is a heap-based buffer overflow in bm_readbody_bmp within bitmap_io.c, affecting potrace versions before 1.13. The CVE description says a crafted BMP image can trigger the flaw; NVD also classifies the issue as CWE-119 and assigns a CVSS 3.0 score of 7.8 (HIGH).
- Vendor
- Potrace Project
- Product
- CVE-2016-8700
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-31
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-31
- Advisory updated
- 2026-05-13
Who should care
Anyone operating or packaging potrace 1.12 or earlier, especially systems that process untrusted BMP images. Downstream distributors and application maintainers that bundle potrace should also verify they are not shipping a vulnerable build.
Technical summary
The vulnerable function is bm_readbody_bmp in bitmap_io.c, where parsing a crafted BMP can lead to a heap-based buffer overflow. NVD maps the issue to CWE-119 and lists affected potrace versions up to and including 1.12. The record also shows a CVSS 3.0 vector of AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, so the practical exposure should be understood in light of user interaction and local execution context, even though the CVE description refers to a remote attacker and crafted image input.
Defensive priority
High
Recommended defensive actions
- Upgrade potrace to version 1.13 or later.
- Inventory all direct and bundled uses of potrace 1.12 and earlier.
- Treat BMP files from untrusted sources as dangerous input until affected systems are updated.
- If immediate upgrading is not possible, restrict where potrace can be used and reduce exposure to untrusted image content.
- Check downstream packages and appliances for backported fixes or lingering vulnerable versions.
Evidence notes
Primary evidence comes from the NVD CVE record and its cited references. The NVD data lists the vulnerability as a heap-based buffer overflow in bm_readbody_bmp in bitmap_io.c, affects potrace versions through 1.12, and maps it to CWE-119. The source references include the potrace ChangeLog, oss-security posts from 2016-08-18 and 2016-10-16, a SecurityFocus entry, and a Gentoo advisory blog post. The CVE record was published on 2017-01-31 and later modified on 2026-05-13. The record contains a notable wording mismatch: the prose description says remote attackers may trigger the issue with a crafted BMP image, while the CVSS vector indicates AV:L and UI:R.
Official resources
-
CVE-2016-8700 CVE record
CVE.org
-
CVE-2016-8700 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Release Notes, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in the CVE/NVD record on 2017-01-31, with supporting references in vendor and mailing-list sources dating to 2016.