Improper Input Validation Affecting ImageMagick-c++-devel package, versions <0:6.7.8.9-13.el7_2


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
97.21% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-IMAGEMAGICKCDEVEL-2505464
  • published10 Apr 2022
  • disclosed5 May 2016

Introduced: 5 May 2016

CVE-2016-3714  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Oracle:7 ImageMagick-c++-devel to version 0:6.7.8.9-13.el7_2 or higher.
This issue was patched in ELSA-2016-0726.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ImageMagick-c++-devel package and not the ImageMagick-c++-devel package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."

References

CVSS Scores

version 3.1