CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
10.1%
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | imagemagick | < 8:6.6.0.4-3 | imagemagick_8:6.6.0.4-3_all.deb |
Debian | 11 | all | imagemagick | < 8:6.6.0.4-3 | imagemagick_8:6.6.0.4-3_all.deb |
Debian | 999 | all | imagemagick | < 8:6.6.0.4-3 | imagemagick_8:6.6.0.4-3_all.deb |
Debian | 13 | all | imagemagick | < 8:6.6.0.4-3 | imagemagick_8:6.6.0.4-3_all.deb |