Vulnerability Description
The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 6.7 |
| Redhat | Enterprise Linux For Ibm Z Systems | 6.0_s390x |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 6.7_s390x |
| Redhat | Enterprise Linux For Power Big Endian | 6.0_ppc64 |
| Redhat | Enterprise Linux For Power Big Endian Eus | 6.7_ppc64 |
| Redhat | Enterprise Linux For Power Little Endian | 7.0_ppc64le |
| Redhat | Enterprise Linux For Power Little Endian Eus | 7.2_ppc64le |
| Redhat | Enterprise Linux Hpc Node | 6.0 |
| Redhat | Enterprise Linux Hpc Node Eus | 7.2 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server From Rhui | 6.0 |
| Redhat | Enterprise Linux Server Supplementary Eus | 6.7z |
| Redhat | Enterprise Linux Server Tus | 7.2 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Imagemagick | Imagemagick | < 6.9.3-10 |
| Canonical | Ubuntu Linux | 12.04 |
| Oracle | Linux | 6 |
| Oracle | Solaris | 10 |
Related Weaknesses (CWE)
References
- http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9Broken LinkPatch
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0726.htmlThird Party Advisory
- http://www.debian.org/security/2016/dsa-3580Mailing ListThird Party Advisory
- http://www.debian.org/security/2016/dsa-3746Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/03/18Mailing ListThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.hThird Party Advisory
- http://www.securityfocus.com/archive/1/538378/100/0/threadedBroken LinkThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/89852Broken LinkThird Party AdvisoryVDB Entry
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackMailing ListThird Party Advisory
FAQ
What is CVE-2016-3715?
CVE-2016-3715 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
How severe is CVE-2016-3715?
CVE-2016-3715 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3715?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux For Ibm Z Systems, Redhat Enterprise Linux For Ibm Z Systems Eus, Redhat Enterprise Linux For Power Big Endian.