CVE-2020-25676
Published: 8 December 2020
In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Priority
Status
Package | Release | Status |
---|---|---|
imagemagick Launchpad, Ubuntu, Debian |
bionic |
Released
(8:6.9.7.4+dfsg-16ubuntu6.11)
|
focal |
Released
(8:6.9.10.23+dfsg-2.1ubuntu11.4)
|
|
groovy |
Released
(8:6.9.10.23+dfsg-2.1ubuntu13.3)
|
|
trusty |
Needed
|
|
lunar |
Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
|
|
hirsute |
Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
|
|
impish |
Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
|
|
jammy |
Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
|
|
kinetic |
Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
|
|
upstream |
Released
(8:6.9.11.24+dfsg-1)
|
|
xenial |
Released
(8:6.8.9.9-7ubuntu5.16+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches: upstream: https://github.com/ImageMagick/ImageMagick6/commit/94aeb3c40d25aee1051ba8eb3a31601558ef2506 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |