High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2014-9854
High
Low
Medium
High
Critical
7.5
CVSS Score
Vulnerability Description
coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H
Known Affected Software
9 configuration(s) from 3 vendor(s)
ubuntu_linux
Version:
14.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
ubuntu_linux
Version:
16.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
ubuntu_linux
Version:
12.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
ubuntu_linux
Version:
16.10
CPE:
cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
opensuse
Version:
13.2
CPE:
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
leap
Version:
42.1
CPE:
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
suse_linux_enterprise_server
Version:
12
CPE:
cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
linux_enterprise_server
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*
linux_enterprise_software_development_kit
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:-:*:*:*:*:*:*
This vulnerability affects 9 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://git.imagemagick.org/repos/ImageMagick/commit/7fb9b7e095a65b4528d0180e26574f2bc7cd0e8bcve@mitre.org Patch
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.htmlcve@mitre.org Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.htmlcve@mitre.org Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.htmlcve@mitre.org Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.htmlcve@mitre.org Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/02/13cve@mitre.org Mailing List Patch
-
http://www.ubuntu.com/usn/USN-3131-1cve@mitre.org Third Party Advisory
-
https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=5ee6f49297c8137cae527429e0267462c14ec3edcve@mitre.org Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=1343514cve@mitre.org Issue Tracking Patch Third Party Advisory
-
http://git.imagemagick.org/repos/ImageMagick/commit/7fb9b7e095a65b4528d0180e26574f2bc7cd0e8baf854a3a-2127-422b-91ae-364da2661108 Patch
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/02/13af854a3a-2127-422b-91ae-364da2661108 Mailing List Patch
-
http://www.ubuntu.com/usn/USN-3131-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=5ee6f49297c8137cae527429e0267462c14ec3edaf854a3a-2127-422b-91ae-364da2661108 Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=1343514af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch Third Party Advisory
Severity Details
7.5
out of 10.0
High
Key Information
- Published Date
- March 17, 2017
