Language:
https://bugzilla.suse.com/show_bug.cgi?id=1000394
https://bugzilla.suse.com/show_bug.cgi?id=1000399
https://bugzilla.suse.com/show_bug.cgi?id=1000434
https://bugzilla.suse.com/show_bug.cgi?id=1000436
https://bugzilla.suse.com/show_bug.cgi?id=1000686
https://bugzilla.suse.com/show_bug.cgi?id=1000688
https://bugzilla.suse.com/show_bug.cgi?id=1000689
https://bugzilla.suse.com/show_bug.cgi?id=1000690
https://bugzilla.suse.com/show_bug.cgi?id=1000691
https://bugzilla.suse.com/show_bug.cgi?id=1000692
https://bugzilla.suse.com/show_bug.cgi?id=1000693
https://www.suse.com/security/cve/CVE-2016-7513/
https://www.suse.com/security/cve/CVE-2016-7514/
https://www.suse.com/security/cve/CVE-2016-7515/
https://www.suse.com/security/cve/CVE-2016-7516/
https://www.suse.com/security/cve/CVE-2016-7517/
https://www.suse.com/security/cve/CVE-2016-7518/
https://www.suse.com/security/cve/CVE-2016-7519/
https://www.suse.com/security/cve/CVE-2016-7520/
https://www.suse.com/security/cve/CVE-2016-7521/
https://www.suse.com/security/cve/CVE-2016-7522/
https://www.suse.com/security/cve/CVE-2016-7523/
https://www.suse.com/security/cve/CVE-2016-7524/
https://www.suse.com/security/cve/CVE-2016-7525/
https://www.suse.com/security/cve/CVE-2016-7526/
https://www.suse.com/security/cve/CVE-2016-7527/
https://www.suse.com/security/cve/CVE-2016-7528/
https://www.suse.com/security/cve/CVE-2016-7529/
https://www.suse.com/security/cve/CVE-2016-7530/
https://www.suse.com/security/cve/CVE-2016-7531/
https://www.suse.com/security/cve/CVE-2016-7532/
https://www.suse.com/security/cve/CVE-2016-7533/
https://www.suse.com/security/cve/CVE-2016-7534/
https://www.suse.com/security/cve/CVE-2016-7535/
https://www.suse.com/security/cve/CVE-2016-7537/
https://www.suse.com/security/cve/CVE-2016-7538/
https://www.suse.com/security/cve/CVE-2016-7539/
https://www.suse.com/security/cve/CVE-2016-7540/
https://www.suse.com/security/cve/CVE-2016-7799/
https://www.suse.com/security/cve/CVE-2016-7800/
https://www.suse.com/security/cve/CVE-2016-7996/
https://www.suse.com/security/cve/CVE-2016-7997/
https://www.suse.com/security/cve/CVE-2016-8677/
https://www.suse.com/security/cve/CVE-2016-8682/
https://www.suse.com/security/cve/CVE-2016-8683/
https://www.suse.com/security/cve/CVE-2016-8684/
http://www.nessus.org/u?1aea0f46
https://bugzilla.suse.com/show_bug.cgi?id=1000694
https://bugzilla.suse.com/show_bug.cgi?id=1000695
https://bugzilla.suse.com/show_bug.cgi?id=1000696
https://bugzilla.suse.com/show_bug.cgi?id=1000697
https://bugzilla.suse.com/show_bug.cgi?id=1000698
https://bugzilla.suse.com/show_bug.cgi?id=1000699
https://bugzilla.suse.com/show_bug.cgi?id=1000700
https://bugzilla.suse.com/show_bug.cgi?id=1000701
https://bugzilla.suse.com/show_bug.cgi?id=1000702
https://bugzilla.suse.com/show_bug.cgi?id=1000703
https://bugzilla.suse.com/show_bug.cgi?id=1000704
https://bugzilla.suse.com/show_bug.cgi?id=1000706
https://bugzilla.suse.com/show_bug.cgi?id=1000707
https://bugzilla.suse.com/show_bug.cgi?id=1000708
https://bugzilla.suse.com/show_bug.cgi?id=1000709
https://bugzilla.suse.com/show_bug.cgi?id=1000711
https://bugzilla.suse.com/show_bug.cgi?id=1000712
https://bugzilla.suse.com/show_bug.cgi?id=1000713
https://bugzilla.suse.com/show_bug.cgi?id=1000714
https://bugzilla.suse.com/show_bug.cgi?id=1000715
https://bugzilla.suse.com/show_bug.cgi?id=1001066
https://bugzilla.suse.com/show_bug.cgi?id=1001221
https://bugzilla.suse.com/show_bug.cgi?id=1002206
https://bugzilla.suse.com/show_bug.cgi?id=1002209
https://bugzilla.suse.com/show_bug.cgi?id=1002421
https://bugzilla.suse.com/show_bug.cgi?id=1002422
https://bugzilla.suse.com/show_bug.cgi?id=1003629
https://bugzilla.suse.com/show_bug.cgi?id=1005123
https://bugzilla.suse.com/show_bug.cgi?id=1005125
https://bugzilla.suse.com/show_bug.cgi?id=1005127
https://bugzilla.suse.com/show_bug.cgi?id=1005328
https://www.suse.com/security/cve/CVE-2014-9907/
https://www.suse.com/security/cve/CVE-2015-8957/
https://www.suse.com/security/cve/CVE-2015-8958/
https://www.suse.com/security/cve/CVE-2015-8959/
Severity: Critical
ID: 94433
File Name: suse_SU-2016-2667-1.nasl
Version: 2.12
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 10/31/2016
Updated: 1/6/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.8
Temporal Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:imagemagick-debuginfo, p-cpe:/a:novell:suse_linux:libmagickcore-6_q16, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:libmagickcore-6_q16-1, p-cpe:/a:novell:suse_linux:libmagickwand-6_q16-1-debuginfo, p-cpe:/a:novell:suse_linux:libmagick%2b%2b-6_q16, p-cpe:/a:novell:suse_linux:libmagickwand-6_q16, p-cpe:/a:novell:suse_linux:libmagickcore-6_q16-1-debuginfo, p-cpe:/a:novell:suse_linux:imagemagick, p-cpe:/a:novell:suse_linux:libmagick%2b%2b-6_q16-3-debuginfo, p-cpe:/a:novell:suse_linux:imagemagick-debugsource
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 10/28/2016
Vulnerability Publication Date: 1/18/2017
CVE: CVE-2014-9907, CVE-2015-8957, CVE-2015-8958, CVE-2015-8959, CVE-2016-6823, CVE-2016-7101, CVE-2016-7513, CVE-2016-7514, CVE-2016-7515, CVE-2016-7516, CVE-2016-7517, CVE-2016-7518, CVE-2016-7519, CVE-2016-7520, CVE-2016-7521, CVE-2016-7522, CVE-2016-7523, CVE-2016-7524, CVE-2016-7525, CVE-2016-7526, CVE-2016-7527, CVE-2016-7528, CVE-2016-7529, CVE-2016-7530, CVE-2016-7531, CVE-2016-7532, CVE-2016-7533, CVE-2016-7534, CVE-2016-7535, CVE-2016-7537, CVE-2016-7538, CVE-2016-7539, CVE-2016-7540, CVE-2016-7799, CVE-2016-7800, CVE-2016-7996, CVE-2016-7997, CVE-2016-8677, CVE-2016-8682, CVE-2016-8683, CVE-2016-8684