CVE-2016-3715 
                        Detail
                     
                    
                    
                        
                            
                                
                                    Deferred This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
                                 
                             
                            Description  
                            
                            The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
                            
                            
                            
                            
                                Metrics 
                                 
                                
                                    CVSS Version 4.0
                                     
                                    CVSS Version 3.x
                                     
                                    CVSS Version 2.0
                                     
                                
                                
                                    
                                        
                                            NVD enrichment efforts reference publicly available information to associate
                                            vector strings. CVSS information contributed by other sources is also
                                            displayed.
                                         
                                     
                                
                                
                                
                                    CVSS 4.0 Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
                                       
                                             NVD assessment
                                       not yet provided.   
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 3.x Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
												Vector:  
													CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
                                     
                                    
                                    
                                    
                                    
                                        
                                            
                                            
                                            
                                            
												Vector:   CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
                                         
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 2.0 Severity and Vector Strings:   
                                    
                                    
                                        
                                        
                                        
												Vector:  
													(AV:N/AC:M/Au:N/C:N/I:P/A:P) 
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                             
                            
                                
                                
                                
                                
                                    References to Advisories, Solutions, and Tools 
                                    
                                        By selecting these links, you will be leaving NIST webspace.
                                        We have provided these links to other web sites because they
                                        may have information that would be of interest to you. No
                                        inferences should be drawn on account of other sites being
                                        referenced, or not, from this page. There may be other web
                                        sites that are more appropriate for your purpose. NIST does
                                        not necessarily endorse the views expressed, or concur with
                                        the facts presented on these sites. Further, NIST does not
                                        endorse any commercial products that may be mentioned on
                                        these sites. Please address comments about this page to [email protected] 
                                    
                                        
                                        
                                            URL 
                                            Source(s) 
                                            Tag(s) 
                                         
                                         
                                        
                                        
                                            
                                            
                                                http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Broken Link  
                                                 
                                                    Patch  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://rhn.redhat.com/errata/RHSA-2016-0726.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.debian.org/security/2016/dsa-3580 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Mailing List  
                                                 
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.debian.org/security/2016/dsa-3746 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Mailing List  
                                                 
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.openwall.com/lists/oss-security/2016/05/03/18 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Mailing List  
                                                 
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.securityfocus.com/archive/1/538378/100/0/threaded 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Broken Link  
                                                 
                                                    Third Party Advisory  
                                                 
                                                    VDB Entry  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.securityfocus.com/bid/89852 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Broken Link  
                                                 
                                                    Third Party Advisory  
                                                 
                                                    VDB Entry  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Mailing List  
                                                 
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                http://www.ubuntu.com/usn/USN-2990-1 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                https://security.gentoo.org/glsa/201611-21 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Third Party Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715 
                                             
                                            
                                            CISA-ADP 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.exploit-db.com/exploits/39767/ 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Exploit  
                                                 
                                                    Third Party Advisory  
                                                 
                                                    VDB Entry  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Exploit  
                                                 
                                                    Vendor Advisory  
                                                 
                                             
                                         
                                        
                                            
                                            
                                                https://www.imagemagick.org/script/changelog.php 
                                             
                                            
                                            CVE, Inc., Red Hat 
                                            
                                            
                                                
                                                    Release Notes  
                                                 
                                             
                                         
                                         
                                    
                                 
                                
                                    
                                        This CVE is in CISA's Known Exploited Vulnerabilities Catalog
                                     
                                    
                                        Reference 
                                        CISA's BOD 22-01  and Known
                                        Exploited Vulnerabilities Catalog  for further guidance and requirements.
                                    
                                    
                                        
                                        
                                            Vulnerability Name 
                                            Date Added 
                                            Due Date 
                                            Required Action 
                                         
                                         
                                        
                                        
                                            ImageMagick Arbitrary File Deletion Vulnerability 
                                            11/03/2021 
                                            05/03/2022 
                                            Apply updates per vendor instructions. 
                                         
                                         
                                    
                                 
                                
                                    Weakness Enumeration 
                                    
                                        
                                        
                                            CWE-ID 
                                            CWE Name 
                                            Source 
                                         
                                         
                                        
                                        
                                            
                                                
                                                NVD-CWE-noinfo 
                                             
                                            Insufficient Information 
                                            
														
														NIST   
														 
                                             
                                         
                                        
                                            
                                                CWE-552 
                                                
                                             
                                            Files or Directories Accessible to External Parties 
                                            
														
														
														
															
															
															
														
														CISA-ADP   
														 
                                             
                                         
                                         
                                    
                                 
                                
                                
                                    Change History 
                                     25 change records found show changes 
                                     
                                    
	
		
			 
			
				CVE Modified by CISA-ADP  10/21/2025 8:15:51 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by CISA-ADP  10/21/2025 4:16:35 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Removed 
						Reference 
						
							
							
							
								https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715 
								  
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by CISA-ADP  10/21/2025 3:16:42 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  4/02/2025 4:16:33 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by CISA-ADP  2/07/2025 9:15:40 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3.1 
						
							
							
								
								
							
							
						 
							
						
							
								AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
								  
					 
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								CWE-552 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  1/28/2025 1:49:35 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by CVE  11/20/2024 9:50:33 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://rhn.redhat.com/errata/RHSA-2016-0726.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.debian.org/security/2016/dsa-3580 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.debian.org/security/2016/dsa-3746 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.openwall.com/lists/oss-security/2016/05/03/18 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/archive/1/538378/100/0/threaded 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/bid/89852 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.ubuntu.com/usn/USN-2990-1 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/201611-21 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.exploit-db.com/exploits/39767/ 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.imagemagick.org/script/changelog.php 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  7/24/2024 1:06:03 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3.1 
						
							
							
								
								
							
							
						 
							
						
							
								NIST AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
								  
					 
					
						Removed 
						CVSS V3 
						
							
							
							
								NIST AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
								  
							
						
								
								
						 
					 
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								NIST NVD-CWE-noinfo 
								  
					 
					
						Removed 
						CWE 
						
							
							
							
								NIST CWE-284 
								  
							
						
								
								
						 
					 
					
						Changed 
						CPE Configuration 
						
							
							
							
								OR
     *cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* versions up to (including) 6.9.3-9
     *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
     *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:* 
								  
							
						
							
								OR
     *cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* versions up to (excluding) 6.9.3-10
     *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
     *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:* 
								  
					 
					
						Changed 
						CPE Configuration 
						
							
							
							
								OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* 
								  
							
						
							
								OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* 
								  
					 
					
						Changed 
						CPE Configuration 
						
							
							
							
								OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* 
								  
							
						
							
								
								Record truncated, showing 2048 of 4111 characters.  View Entire Change Record OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
     *cpe 
								
								
						 
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
     *cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
     *cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
     *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog Patch 
								  
							
						
							
								http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog Broken Link, Patch 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html No Types Assigned 
								  
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html No Types Assigned 
								  
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html No Types Assigned 
								  
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html No Types Assigned 
								  
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html No Types Assigned 
								  
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.debian.org/security/2016/dsa-3580 No Types Assigned 
								  
							
						
							
								http://www.debian.org/security/2016/dsa-3580 Mailing List, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.debian.org/security/2016/dsa-3746 No Types Assigned 
								  
							
						
							
								http://www.debian.org/security/2016/dsa-3746 Mailing List, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html No Types Assigned 
								  
							
						
							
								http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html No Types Assigned 
								  
							
						
							
								http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.securityfocus.com/archive/1/538378/100/0/threaded No Types Assigned 
								  
							
						
							
								http://www.securityfocus.com/archive/1/538378/100/0/threaded Broken Link, Third Party Advisory, VDB Entry 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.securityfocus.com/bid/89852 No Types Assigned 
								  
							
						
							
								http://www.securityfocus.com/bid/89852 Broken Link, Third Party Advisory, VDB Entry 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 No Types Assigned 
								  
							
						
							
								http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 Mailing List, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://security.gentoo.org/glsa/201611-21 No Types Assigned 
								  
							
						
							
								https://security.gentoo.org/glsa/201611-21 Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.exploit-db.com/exploits/39767/ No Types Assigned 
								  
							
						
							
								https://www.exploit-db.com/exploits/39767/ Exploit, Third Party Advisory, VDB Entry 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 Vendor Advisory 
								  
							
						
							
								https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 Exploit, Vendor Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  5/13/2024 11:57:32 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  2/12/2023 6:19:47 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Description 
						
							
							
							
								It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete arbitrary files. 
								  
							
						
							
								The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image. 
								  
					 
					
						Removed 
						CVSS V2 
						
							
							
							
								Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:P/A:N) 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								https://access.redhat.com/errata/RHSA-2016:0726 [No Types Assigned] 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								https://access.redhat.com/security/cve/CVE-2016-3715 [No Types Assigned] 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								https://bugzilla.redhat.com/show_bug.cgi?id=1332500 [No Types Assigned] 
								  
							
						
								
								
						 
					 
					
						Removed 
						CVSS V2 Metadata 
						
							
							
							
								Victim must voluntarily interact with attack mechanism 
								  
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  2/02/2023 4:16:54 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Description 
						
							
							
							
								The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image. 
								  
							
						
							
								It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete arbitrary files. 
								  
					 
					
						Added 
						CVSS V2 
						
							
							
								
								
							
							
						 
							
						
							
								Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:P/A:N) 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://access.redhat.com/errata/RHSA-2016:0726 [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://access.redhat.com/security/cve/CVE-2016-3715 [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://bugzilla.redhat.com/show_bug.cgi?id=1332500 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  10/09/2018 3:59:58 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/archive/1/538378/100/0/threaded [No Types Assigned] 
								  
					 
					
						Removed 
						Reference 
						
							
							
							
								http://www.securityfocus.com/archive/1/archive/1/538378/100/0/threaded [No Types Assigned] 
								  
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  11/03/2017 9:29:19 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.debian.org/security/2016/dsa-3746 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  9/06/2017 9:29:03 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.exploit-db.com/exploits/39767/ [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  6/30/2017 9:29:44 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/201611-21 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  12/27/2016 9:59:30 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/bid/89852 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  11/30/2016 10:10:08 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.debian.org/security/2016/dsa-3580 [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/archive/1/archive/1/538378/100/0/threaded [No Types Assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  10/03/2016 10:08:10 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  9/22/2016 9:59:56 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  8/19/2016 3:45:10 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CPE Configuration 
						
							
							
							
								Configuration 1
     OR
          *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:6.9.3-9:*:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* 
								  
							
						
							
								Configuration 1
     OR
          *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:6.9.3-9:*:*:*:*:*:*:* (and previous)
Configuration 3
     OR
          *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://rhn.redhat.com/errata/RHSA-2016-0726.html No Types Assigned 
								  
							
						
							
								http://rhn.redhat.com/errata/RHSA-2016-0726.html Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.openwall.com/lists/oss-security/2016/05/03/18 No Types Assigned 
								  
							
						
							
								http://www.openwall.com/lists/oss-security/2016/05/03/18 Third Party Advisory, Mailing List 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.ubuntu.com/usn/USN-2990-1 No Types Assigned 
								  
							
						
							
								http://www.ubuntu.com/usn/USN-2990-1 Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.imagemagick.org/script/changelog.php No Types Assigned 
								  
							
						
							
								https://www.imagemagick.org/script/changelog.php Release Notes 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  7/13/2016 10:00:55 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://rhn.redhat.com/errata/RHSA-2016-0726.html 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  6/21/2016 5:55:20 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CPE Configuration 
						
							
							
							
								Configuration 1
     OR
          *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:6.9.3-9:*:*:*:*:*:*:* (and previous) 
								  
							
						
							
								Configuration 1
     OR
          *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:6.9.3-9:*:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  6/20/2016 9:59:38 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.ubuntu.com/usn/USN-2990-1 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  5/06/2016 1:02:11 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3 
						
							
							
								
								
							
							
						 
							
						
							
								AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 
								  
					 
					
						Added 
						CVSS V2 
						
							
							
								
								
							
							
						 
							
						
							
								(AV:N/AC:M/Au:N/C:N/I:P/A:P) 
								  
					 
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								CWE-284 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								Configuration 1
     OR
          *cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
          *cpe:2.3:a:imagemagick:imagemagick:6.9.3-9:*:*:*:*:*:*:* (and previous) 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog No Types Assigned 
								  
							
						
							
								http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog Patch 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 No Types Assigned 
								  
							
						
							
								https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				Initial CVE Analysis  5/06/2016 12:52:33 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		  
	 
                                 
                             
                         
                        
                            
                                Quick Info 
                                CVE Dictionary Entry:  CVE-2016-3715  NVD
                                Published Date:  05/05/2016  NVD
                                Last Modified:  10/21/2025  
                                Source:  Red Hat, Inc.