CVE-2016-3714

Published on: 05/05/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."

  • CVE-2016-3714 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.4 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3580-1 imagemagick Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3580
[security-announce] openSUSE-SU-2016:1266-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1266
1332492 – (CVE-2016-3714, ImageTragick) CVE-2016-3714 ImageMagick: Insufficient shell characters filtering Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1332492
Debian -- Security Information -- DSA-3746-1 graphicsmagick Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3746
oss-security - ImageMagick Is On Fire -- CVE-2016-3714 Mailing List
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160503 ImageMagick Is On Fire -- CVE-2016-3714
CVE-2016-3714 ImageMagick Delegate Arbitrary Command Execution | Rapid7 Third Party Advisory
www.rapid7.com
text/html
URL Logo MISC www.rapid7.com/db/modules/exploit/unix/fileformat/imagemagick_delegate
[security-announce] openSUSE-SU-2016:1326-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1326
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0726
oss-security - Re: ImageMagick Is On Fire -- CVE-2016-3714 Mailing List
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160504 Re: ImageMagick Is On Fire -- CVE-2016-3714
SecurityFocus Third Party Advisory
VDB Entry
www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160513 May 2016 - HipChat Server - Critical Security Advisory
USN-2990-1: ImageMagick vulnerabilities | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2990-1
ImageTragick Vendor Advisory
imagetragick.com
text/html
URL Logo MISC imagetragick.com/
[security-announce] SUSE-SU-2016:1260-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1260
Vulnerability Note VU#250519 - ImageMagick does not properly validate input before processing images using a delegate Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#250519
Changelog @ ImageMagick Vendor Advisory
www.imagemagick.org
text/html
URL Logo CONFIRM www.imagemagick.org/script/changelog.php
Oracle Linux Bulletin - April 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
ImageMagick Security Issue - ImageMagick Vendor Advisory
www.imagemagick.org
text/html
URL Logo CONFIRM www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
ImageTragick ImageMagick Proof Of Concepts ≈ Packet Storm Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html
ImageMagick CVE-2016-3714 Remote Code Execution Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 89848
ImageMagick: Multiple vulnerabilities (GLSA 201611-21) — Gentoo security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201611-21
[security-announce] SUSE-SU-2016:1275-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1275
[security-announce] openSUSE-SU-2016:1261-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1261
ImageTragick - ImageMagick Filtering Vulnerability - CVE-2016-3714 - Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo CONFIRM access.redhat.com/security/vulnerabilities/2296071
ImageMagick 7.0.1-0 / 6.9.3-9 - 'ImageTragick ' Multiple Vulnerabilities - Multiple dos Exploit Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39767
[security-announce] SUSE-SU-2016:1301-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1301
ChangeLog · a01518e08c840577cabd7d3ff291a9ba735f7276 · repos / ImageMagick · GitLab Patch
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
The Slackware Linux Project: Slackware Security Advisories Third Party Advisory
www.slackware.com
text/html
URL Logo SLACKWARE SSA:2016-132-01
ImageMagick 6.9.3-9 / 7.0.1-0 - 'ImageTragick' Delegate Arbitrary Command Execution (Metasploit) - Multiple local Exploit Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39791
ImageMagick File Processing Input Validation Flaw Lets Remote Users Read/Move/Delete Arbitrary Files and Execute Arbitrary Commands - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1035742
Oracle Solaris Bulletin - July 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

Exploit/POC from Github

Fix ImageMagick Command Injection (CVE-2016-3714) with Ansible.

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
ApplicationImagemagickImagemagick7.0.0-0AllAllAll
ApplicationImagemagickImagemagick7.0.1-0AllAllAll
ApplicationImagemagickImagemagick7.0.0-0AllAllAll
ApplicationImagemagickImagemagick7.0.1-0AllAllAll
ApplicationImagemagickImagemagickAllAllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
SuseSuse Linux Enterprise Server12AllAllAll
Operating
System
SuseSuse Linux Enterprise Server12AllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*:
  • cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*:
  • cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*:
  • cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*:
  • cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*: