CVE-2016-3717 Details

CVE-2016-3717

Published: 2016-05-05
Last Modified: 2018-10-09
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.1/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 6.9/10
Confidentiality Impact Complete
Availability Impact None
Integrity Impact None
Vector String AV:N/AC:M/Au:N/C:C/I:N/A:N
Common Vulnerability Score System v3.1
Severity Medium
Base Score 5.5/10
Exploit Score 1.8/10
Access Vector Local
Access Complexity Low
Privileges Required Low
Impact Score 3.6/10
Confidentiality Impact High
Availability Impact None
Integrity Impact None
Scope Unchanged
User Interaction None
Vector String CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:* Yes - -
References

http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
http://rhn.redhat.com/errata/RHSA-2016-0726.html
http://www.debian.org/security/2016/dsa-3580
http://www.openwall.com/lists/oss-security/2016/05/03/18
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/archive/1/538378/100/0/threaded
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
http://www.ubuntu.com/usn/USN-2990-1
https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
https://security.gentoo.org/glsa/201611-21
https://www.exploit-db.com/exploits/39767/
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
https://www.imagemagick.org/script/changelog.php

CVE ID
CVE-2016-3717
Published
2016-05-05
Modified
2018-10-09
CVSSv2.0
High
CVSSv3.1
Medium
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-200

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.