Vulnerability Details : CVE-2016-5118
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
Vulnerability category: Execute code
Products affected by CVE-2016-5118
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
- cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-5118
75.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-5118
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2016-5118
-
http://www.ubuntu.com/usn/USN-2990-1
USN-2990-1: ImageMagick vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
[security-announce] openSUSE-SU-2016:1653-1: important: Security updateMailing List;Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3591
Debian -- Security Information -- DSA-3591-1 imagemagickThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/05/29/7
oss-security - CVE Request: GraphicsMagick and ImageMagick popen() shell vulnerability via filenameMailing List;Release Notes
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
[security-announce] SUSE-SU-2016:1570-1: important: Security update forThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Oracle Solaris Bulletin - July 2016Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3746
Debian -- Security Information -- DSA-3746-1 graphicsmagickThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
[security-announce] openSUSE-SU-2016:1521-1: important: Security updateThird Party Advisory
-
http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog
Mercurial Repository: p/graphicsmagick/code: ChangeLog@41876934e762Release Notes;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2016/05/30/1
oss-security - Re: CVE Request: GraphicsMagick and ImageMagick popen() shell vulnerability via filenameMailing List;Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Oracle Linux Bulletin - April 2016Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
[security-announce] SUSE-SU-2016:1610-1: important: Security update forMailing List;Third Party Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
The Slackware Linux Project: Slackware Security AdvisoriesThird Party Advisory
-
http://www.securitytracker.com/id/1035984
ImageMagick popen() File Open Feature Lets Remote Users Execute Arbitrary Commands on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858
Mercurial Repository: p/graphicsmagick/code: changeset 14851:ae3928faa858Broken Link
-
http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8
503 Service UnavailableBroken Link;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
[security-announce] openSUSE-SU-2016:1522-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
[security-announce] openSUSE-SU-2016:1534-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
[security-announce] SUSE-SU-2016:1614-1: important: Security update forThird Party Advisory
-
http://www.securitytracker.com/id/1035985
GraphicsMagick popen() File Open Feature Lets Remote Users Execute Arbitrary Commands on the Target System - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2016:1237
RHSA-2016:1237 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/90938
ImageMagick CVE-2016-5118 Remote Command Execution VulnerabilityBroken Link;Third Party Advisory;VDB Entry
Jump to