6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
48.4%
It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.10 | noarch | libmagickcore-6.q16-6-extra | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6-common | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6-doc | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6.q16 | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6.q16-dbgsym | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6.q16hdri | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-6.q16hdri-dbgsym | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-common | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
Ubuntu | 20.10 | noarch | imagemagick-doc | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
ubuntu.com/security/CVE-2017-14528
ubuntu.com/security/CVE-2020-19667
ubuntu.com/security/CVE-2020-25665
ubuntu.com/security/CVE-2020-25666
ubuntu.com/security/CVE-2020-25674
ubuntu.com/security/CVE-2020-25675
ubuntu.com/security/CVE-2020-25676
ubuntu.com/security/CVE-2020-27750
ubuntu.com/security/CVE-2020-27751
ubuntu.com/security/CVE-2020-27753
ubuntu.com/security/CVE-2020-27754
ubuntu.com/security/CVE-2020-27755
ubuntu.com/security/CVE-2020-27756
ubuntu.com/security/CVE-2020-27757
ubuntu.com/security/CVE-2020-27758
ubuntu.com/security/CVE-2020-27759
ubuntu.com/security/CVE-2020-27760
ubuntu.com/security/CVE-2020-27761
ubuntu.com/security/CVE-2020-27762
ubuntu.com/security/CVE-2020-27763
ubuntu.com/security/CVE-2020-27764
ubuntu.com/security/CVE-2020-27765
ubuntu.com/security/CVE-2020-27766
ubuntu.com/security/CVE-2020-27767
ubuntu.com/security/CVE-2020-27768
ubuntu.com/security/CVE-2020-27769
ubuntu.com/security/CVE-2020-27770
ubuntu.com/security/CVE-2020-27771
ubuntu.com/security/CVE-2020-27772
ubuntu.com/security/CVE-2020-27773
ubuntu.com/security/CVE-2020-27774
ubuntu.com/security/CVE-2020-27775
ubuntu.com/security/CVE-2020-27776
ubuntu.com/security/CVE-2021-20176
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
48.4%