5.5
CVSSv3

CVE-2016-3717

Published: 05/05/2016 Updated: 12/02/2023
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 715
Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N

Vulnerability Summary

The LABEL coder in ImageMagick prior to 6.9.3-10 and 7.x prior to 7.0.1-1 allows remote malicious users to read arbitrary files via a crafted image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

redhat enterprise linux server supplementary eus 6.7z

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 6.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.2

redhat enterprise linux desktop 6.0

redhat enterprise linux hpc node eus 7.2

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

imagemagick imagemagick 7.0.0-0

imagemagick imagemagick

imagemagick imagemagick 7.0.1-0

Vendor Advisories

Debian Bug report logs - #814732 graphicsmagick: SVG parsing issues (CVE-2016-2317, CVE-2016-2318) Package: src:graphicsmagick; Maintainer for src:graphicsmagick is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 14 Feb 2016 19:27:01 UTC Severity: important ...
Several security issues were fixed in ImageMagick ...
Nikolay Ermishkin from the MailRu Security Team and Stewie discovered several vulnerabilities in ImageMagick, a program suite for image manipulation These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input An attacker with control on the image input could, with the privileges of th ...
It was discovered that ImageMagick did not properly sanitize certain input before passing it to the delegate functionality A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands wit ...
It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow ...

Exploits

Nikolay Ermishkin from the MailRu Security Team discovered several vulnerabilities in ImageMagick We've reported these issues to developers of ImageMagick and they made a fix for RCE in sources and released new version (693-9 released 2016-04-30 legacyimagemagickorg/script/changelogphp), but this fix seems to be incomplete We are sti ...