CVE-2016-3714
Published: 05 May 2016
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
From the Ubuntu security team
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
Priority
CVSS 3 base score: 8.4
Status
Package | Release | Status |
---|---|---|
graphicsmagick Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1.3.24-1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.3.23-1ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.3.18-1ubuntu3.1)
|
|
imagemagick Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(8:6.8.9.9-7ubuntu7)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(8:6.8.9.9-7ubuntu5.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [8:6.7.7.10-6ubuntu3.1])
|
|
Patches: Upstream: https://github.com/ImageMagick/ImageMagick/commit/06c41aba39b97203f6b9a0be6a2ccf8888cddc93 (1) Upstream: https://github.com/ImageMagick/ImageMagick/commit/a347456a1ef3b900c20402f9866992a17eb5d181 (2) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714 has workaround
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726
- http://www.openwall.com/lists/oss-security/2016/05/03/18
- https://usn.ubuntu.com/usn/usn-2990-1
- NVD
- Launchpad
- Debian