The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0726.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/03/18 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2990-1 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39767/ - Third Party Advisory, VDB Entry | |
References | () https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Vendor Advisory | |
References | () https://www.imagemagick.org/script/changelog.php - Release Notes |
24 Jul 2024, 17:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:* cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:* |
First Time |
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux Server From Rhui Suse manager Proxy Redhat enterprise Linux For Ibm Z Systems Suse linux Enterprise Software Development Kit Opensuse Redhat enterprise Linux For Power Little Endian Opensuse leap Oracle Redhat enterprise Linux For Power Big Endian Eus Opensuse opensuse Oracle linux Suse linux Enterprise Desktop Suse Redhat enterprise Linux For Power Big Endian Redhat enterprise Linux Server Tus Redhat enterprise Linux For Ibm Z Systems Eus Suse linux Enterprise Debuginfo Suse linux Enterprise Workstation Extension Suse openstack Cloud Suse manager Redhat enterprise Linux Eus Oracle solaris Suse linux Enterprise Server |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39767/ - Third Party Advisory, VDB Entry | |
CWE | CWE-918 |
Information
Published : 2016-05-05 18:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3718
Mitre link : CVE-2016-3718
CVE.ORG link : CVE-2016-3718
JSON object : View
Products Affected
opensuse
- opensuse
- leap
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_hpc_node_eus
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_server_from_rhui
- enterprise_linux_server_tus
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_for_power_big_endian
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_workstation
- enterprise_linux_server_supplementary_eus
- enterprise_linux_hpc_node
suse
- linux_enterprise_server
- manager
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
- openstack_cloud
- linux_enterprise_debuginfo
- manager_proxy
- linux_enterprise_workstation_extension
imagemagick
- imagemagick
oracle
- solaris
- linux
canonical
- ubuntu_linux
CWE
CWE-918
Server-Side Request Forgery (SSRF)