Search for vulnerabilities
Vulnerability details: VCID-4pt4-qt9w-aaac
Vulnerability ID VCID-4pt4-qt9w-aaac
Aliases CVE-2018-5248
Summary In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5248.html
cvssv3 3.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5248.json
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01430 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01493 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01493 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01493 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01493 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.01765 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.02094 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.02094 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.02094 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.02094 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
epss 0.0443 https://api.first.org/data/v1/epss?cve=CVE-2018-5248
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1533568
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-5248
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2018-5248
generic_textual Low https://ubuntu.com/security/notices/USN-3681-1
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5248.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5248.json
https://api.first.org/data/v1/epss?cve=CVE-2018-5248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
https://github.com/ImageMagick/ImageMagick/issues/927
https://ubuntu.com/security/notices/USN-3681-1
https://usn.ubuntu.com/3681-1/
https://www.debian.org/security/2018/dsa-4204
https://www.debian.org/security/2018/dsa-4245
http://www.securityfocus.com/bid/102431
1533568 https://bugzilla.redhat.com/show_bug.cgi?id=1533568
886588 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886588
cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-5248 https://nvd.nist.gov/vuln/detail/CVE-2018-5248
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5248.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-5248
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-5248
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.86956
EPSS Score 0.01430
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.