A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1898296 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=1898296 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1898296 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html - |
Information
Published : 2020-12-04 21:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27774
Mitre link : CVE-2020-27774
CVE.ORG link : CVE-2020-27774
JSON object : View
Products Affected
imagemagick
- imagemagick
debian
- debian_linux
redhat
- enterprise_linux
CWE
CWE-190
Integer Overflow or Wraparound