A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1898304 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=1898304 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1898304 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html - |
Information
Published : 2020-12-04 21:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27776
Mitre link : CVE-2020-27776
CVE.ORG link : CVE-2020-27776
JSON object : View
Products Affected
imagemagick
- imagemagick
redhat
- enterprise_linux
CWE
CWE-190
Integer Overflow or Wraparound