CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.2%
Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.
Vendor | Product | Version | CPE |
---|---|---|---|
suse | studio_onsite | 1.3 | cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:* |
opensuse | leap | 42.2 | cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* |
opensuse | opensuse | 13.2 | cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
opensuse_project | leap | 42.1 | cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_debuginfo | 11.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_desktop | 12.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_server | 11.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_server | 12.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_software_development_kit | 11.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:* |
opensuse_project | suse_linux_enterprise_software_development_kit | 12.0 | cpe:2.3:o:opensuse_project:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html
lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html
www.openwall.com/lists/oss-security/2016/06/02/13
www.ubuntu.com/usn/USN-3131-1
anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=2d90693af41a363a988a9db3a91a15f9ca7c7370
bugzilla.redhat.com/show_bug.cgi?id=1343504
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.2%