The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
28 Jan 2025, 18:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3746 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2990-1 - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/03/18 - Mailing List, Third Party Advisory | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Mailing List, Third Party Advisory | |
References | () https://www.imagemagick.org/script/changelog.php - Release Notes | |
References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | () http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Broken Link, Patch | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0726.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39767/ - Exploit, Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/89852 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Exploit, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory |
24 Jul 2024, 17:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:* cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* |
CWE | NVD-CWE-noinfo | |
First Time |
Suse linux Enterprise Server
Redhat enterprise Linux For Power Big Endian Opensuse Redhat enterprise Linux For Power Big Endian Eus Suse Oracle linux Suse linux Enterprise Desktop Redhat enterprise Linux Server From Rhui Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux For Ibm Z Systems Suse manager Proxy Suse manager Suse openstack Cloud Opensuse leap Opensuse opensuse Oracle solaris Suse linux Enterprise Workstation Extension Redhat enterprise Linux Eus Suse linux Enterprise Software Development Kit Redhat enterprise Linux For Power Little Endian Oracle Redhat enterprise Linux Server Tus Suse linux Enterprise Debuginfo Redhat enterprise Linux For Ibm Z Systems Eus |
|
References | (DEBIAN) http://www.debian.org/security/2016/dsa-3746 - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/89852 - Broken Link, Third Party Advisory, VDB Entry | |
References | (DEBIAN) http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | (CONFIRM) http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Broken Link, Patch | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | (SLACKWARE) http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | (EXPLOIT-DB) https://www.exploit-db.com/exploits/39767/ - Exploit, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Exploit, Vendor Advisory |
Information
Published : 2016-05-05 18:59
Updated : 2025-04-02 20:16
NVD link : CVE-2016-3715
Mitre link : CVE-2016-3715
JSON object : View
Products Affected
redhat
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_desktop
- enterprise_linux_server_from_rhui
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_aus
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_hpc_node_eus
- enterprise_linux_server_tus
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_power_big_endian
- enterprise_linux_server
- enterprise_linux_eus
- enterprise_linux_hpc_node
- enterprise_linux_server_supplementary_eus
- enterprise_linux_workstation
canonical
- ubuntu_linux
imagemagick
- imagemagick
suse
- manager_proxy
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_workstation_extension
- openstack_cloud
- manager
- linux_enterprise_debuginfo
oracle
- solaris
- linux
opensuse
- leap
- opensuse
CWE