First published: Thu Jan 05 2017(Updated: )
A path traversal vulnerability was found in ImageMagick. An arbitrary module could be loaded into ImageMagick. References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833735">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833735</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb">https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <6.9.4 | 6.9.4 |
ImageMagick ImageMagick | =6.9.4-7 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10048 is considered a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2016-10048, update ImageMagick to a version greater than 6.9.4 or apply any available security patches.
CVE-2016-10048 affects ImageMagick versions prior to 6.9.4-7.
CVE-2016-10048 exploits a path traversal vulnerability that allows an arbitrary module to be loaded into ImageMagick.
The impact of CVE-2016-10048 could lead to unauthorized execution of malicious code, potentially compromising the server where ImageMagick is installed.