Language:
Severity: High
ID: 90981
File Name: openSUSE-2016-569.nasl
Version: 2.15
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/9/2016
Updated: 9/10/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-3714
Risk Factor: High
Base Score: 8.4
Temporal Score: 8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:libmagickcore-6_q16-2-debuginfo, p-cpe:/a:novell:opensuse:perl-perlmagick-debuginfo, p-cpe:/a:novell:opensuse:imagemagick-devel, p-cpe:/a:novell:opensuse:imagemagick-extra, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-2-32bit, p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-2-debuginfo-32bit, p-cpe:/a:novell:opensuse:imagemagick, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-5, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-5-32bit, p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel-32bit, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-5-debuginfo-32bit, cpe:/o:novell:opensuse:13.2, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-2-debuginfo, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-2, p-cpe:/a:novell:opensuse:imagemagick-extra-debuginfo, p-cpe:/a:novell:opensuse:imagemagick-debugsource, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-2-32bit, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-2, p-cpe:/a:novell:opensuse:imagemagick-debuginfo, p-cpe:/a:novell:opensuse:perl-perlmagick, p-cpe:/a:novell:opensuse:imagemagick-devel-32bit, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-2-debuginfo-32bit, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-5-debuginfo
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/7/2016
CISA Known Exploited Vulnerability Due Dates: 5/3/2022, 9/30/2024
CVE: CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718