7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.007 Low
EPSS
Percentile
80.3%
Package : imagemagick
Version : 8:6.7.7.10-5+deb7u7
CVE ID : CVE-2016-4563
The code did not check the integer didn't overflow before trying to
resize a buffer. A specially crafted file could result in using memory
past the end of the allocated buffer.
This security CVEs for this issue (CVE-2016-4563) along with
CVE-2016-4562 and CVE-2016-4564 were based on a security advisory that
will not be made public. This security fix was generated based only on
the surface-level code-change information that is public in GitHub. For
more information on this, see: http://seclists.org/oss-sec/2016/q2/476
For Debian 7 "Wheezy", these problems have been fixed in version
8:6.7.7.10-5+deb7u7.
We recommend that you upgrade your imagemagick packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Brian May <[email protected]>
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.007 Low
EPSS
Percentile
80.3%