Search for vulnerabilities
Vulnerability details: VCID-9842-2jg8-aaas
Vulnerability ID VCID-9842-2jg8-aaas
Aliases CVE-2016-3714
Summary The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3714.html
rhas Important https://access.redhat.com/errata/RHSA-2016:0726
cvssv3 8.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3714.json
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93863 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93866 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93877 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93877 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93877 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.93877 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.94035 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97209 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97249 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97249 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97377 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97377 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97377 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97377 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
epss 0.97377 https://api.first.org/data/v1/epss?cve=CVE-2016-3714
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2016-3714
cvssv3 8.4 https://nvd.nist.gov/vuln/detail/CVE-2016-3714
cvssv3 8.4 https://nvd.nist.gov/vuln/detail/CVE-2016-3714
cvssv3.1 8.4 https://nvd.nist.gov/vuln/detail/CVE-2016-3714
generic_textual Medium https://ubuntu.com/security/notices/USN-2990-1
generic_textual Medium https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726
generic_textual Medium http://www.openwall.com/lists/oss-security/2016/05/03/18
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Reference id Reference type URL
http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3714.html
http://rhn.redhat.com/errata/RHSA-2016-0726.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3714.json
https://access.redhat.com/security/vulnerabilities/2296071
https://api.first.org/data/v1/epss?cve=CVE-2016-3714
https://bugzilla.redhat.com/show_bug.cgi?id=1332492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
https://imagetragick.com/
https://security.gentoo.org/glsa/201611-21
https://ubuntu.com/security/notices/USN-2990-1
https://www.exploit-db.com/exploits/39767/
https://www.exploit-db.com/exploits/39791/
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726
https://www.imagemagick.org/script/changelog.php
https://www.kb.cert.org/vuls/id/250519
http://www.debian.org/security/2016/dsa-3580
http://www.debian.org/security/2016/dsa-3746
http://www.openwall.com/lists/oss-security/2016/05/03/13
http://www.openwall.com/lists/oss-security/2016/05/03/18
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.rapid7.com/db/modules/exploit/unix/fileformat/imagemagick_delegate
http://www.securityfocus.com/archive/1/538378/100/0/threaded
http://www.securityfocus.com/bid/89848
http://www.securitytracker.com/id/1035742
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
http://www.ubuntu.com/usn/USN-2990-1
cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
CVE-2016-3714 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/39791.rb
CVE-2016-3714 https://nvd.nist.gov/vuln/detail/CVE-2016-3714
CVE-2016-3718;CVE-2016-3717;CVE-2016-3716;CVE-2016-3715;CVE-2016-3714 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39767.txt
RHSA-2016:0726 https://access.redhat.com/errata/RHSA-2016:0726
USN-2990-1 https://usn.ubuntu.com/2990-1/
Data source Exploit-DB
Date added May 9, 2016
Description ImageMagick 6.9.3-9 / 7.0.1-0 - 'ImageTragick' Delegate Arbitrary Command Execution (Metasploit)
Ransomware campaign use Known
Source publication date May 9, 2016
Exploit type local
Platform multiple
Source update date April 29, 2018
Data source KEV
Date added Sept. 9, 2024
Description ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.
Required action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Due date Sept. 30, 2024
Note
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714
Ransomware campaign use Unknown
Data source Metasploit
Description This module exploits a shell command injection in the way "delegates" (commands for converting files) are processed in ImageMagick versions <= 7.0.1-0 and <= 6.9.3-9 (legacy). Since ImageMagick uses file magic to detect file format, you can create a .png (for example) which is actually a crafted SVG (for example) that triggers the command injection. The PostScript (PS) target leverages a Ghostscript -dSAFER bypass (discovered by taviso) to achieve RCE in the Ghostscript delegate. Ghostscript versions 9.18 and later are affected. This target is provided as is and will not be updated to track additional vulns. If USE_POPEN is set to true, a |-prefixed command will be used for the exploit. No delegates are involved in this exploitation.
Note
Stability:
  - crash-safe
SideEffects: []
Reliability: []
AKA:
  - ImageTragick
RelatedModules:
  - exploit/unix/fileformat/ghostscript_type_confusion
  - exploit/multi/fileformat/ghostscript_failed_restore
Ransomware campaign use Unknown
Source publication date May 3, 2016
Platform Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/fileformat/imagemagick_delegate.rb
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3714.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3714
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3714
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3714
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3714
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.99864
EPSS Score 0.93863
Published At June 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.