The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Feb 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-552 |
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Broken Link, Patch | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0726.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3746 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/03/18 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/89852 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Mailing List, Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2990-1 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39767/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Exploit, Vendor Advisory | |
References | () https://www.imagemagick.org/script/changelog.php - Release Notes |
24 Jul 2024, 17:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:* |
CWE | NVD-CWE-noinfo | |
References | () http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Broken Link, Patch | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3746 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/89852 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39767/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Exploit, Vendor Advisory | |
First Time |
Opensuse leap
Oracle Redhat enterprise Linux For Ibm Z Systems Eus Suse openstack Cloud Opensuse Redhat enterprise Linux Eus Suse manager Proxy Suse manager Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux Server Tus Redhat enterprise Linux Server From Rhui Suse Suse linux Enterprise Desktop Suse linux Enterprise Software Development Kit Redhat enterprise Linux For Power Little Endian Eus Suse linux Enterprise Server Oracle solaris Opensuse opensuse Suse linux Enterprise Workstation Extension Redhat enterprise Linux For Ibm Z Systems Oracle linux Redhat enterprise Linux For Power Big Endian Eus Redhat enterprise Linux For Power Big Endian Suse linux Enterprise Debuginfo |
Information
Published : 2016-05-05 18:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-3715
Mitre link : CVE-2016-3715
CVE.ORG link : CVE-2016-3715
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_hpc_node_eus
- enterprise_linux_server_aus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_eus
- enterprise_linux_for_power_big_endian
- enterprise_linux_for_power_little_endian
- enterprise_linux_server_supplementary_eus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_from_rhui
suse
- manager
- openstack_cloud
- linux_enterprise_desktop
- linux_enterprise_workstation_extension
- linux_enterprise_debuginfo
- linux_enterprise_software_development_kit
- linux_enterprise_server
- manager_proxy
opensuse
- opensuse
- leap
oracle
- solaris
- linux
canonical
- ubuntu_linux
imagemagick
- imagemagick
CWE