8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
ImageMagick is susceptible to Denial of Service(DoS). It is possible due to the way it handles the input images which has malformed Exif metadata, allowing an attacker to lead to an application crash using malicious input.
rhn.redhat.com/errata/RHSA-2012-0544.html
rhn.redhat.com/errata/RHSA-2012-0545.html
secunia.com/advisories/47926
secunia.com/advisories/48247
secunia.com/advisories/48259
secunia.com/advisories/49043
secunia.com/advisories/49063
secunia.com/advisories/49068
ubuntu.com/usn/usn-1435-1
www.cert.fi/en/reports/2012/vulnerability595210.html
www.debian.org/security/2012/dsa-2427
www.gentoo.org/security/en/glsa/glsa-201203-09.xml
www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20286
www.osvdb.org/79003
www.securitytracker.com/id?1027032
access.redhat.com/security/updates/classification/#moderate
rhn.redhat.com/errata/RHSA-2012-0301.html
rhn.redhat.com/errata/RHSA-2012-0545.html
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P