Search for vulnerabilities
Vulnerability details: VCID-pxp4-tpmy-aaam
Vulnerability ID VCID-pxp4-tpmy-aaam
Aliases CVE-2008-6071
Summary Heap-based buffer overflow in the DecodeImage function in coders/pict.c in GraphicsMagick before 1.1.14, and 1.2.x before 1.2.3, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted PICT image. NOTE: some of these details are obtained from third party information.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.06771 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07155 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07202 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07356 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07356 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07356 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.07356 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
epss 0.17051 https://api.first.org/data/v1/epss?cve=CVE-2008-6071
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=516295
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2008-6071
Reference id Reference type URL
http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/pict.c
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6071.json
https://api.first.org/data/v1/epss?cve=CVE-2008-6071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6071
http://secunia.com/advisories/30549
https://exchange.xforce.ibmcloud.com/vulnerabilities/42906
http://sourceforge.net/project/shownotes.php?release_id=604785
http://sourceforge.net/project/shownotes.php?release_id=604837
http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
http://www.securityfocus.com/bid/29583
516295 https://bugzilla.redhat.com/show_bug.cgi?id=516295
cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
CVE-2008-6071 https://nvd.nist.gov/vuln/detail/CVE-2008-6071
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-6071
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.90766
EPSS Score 0.06771
Published At May 7, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.