Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-27774

Published: 4 December 2020

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

Notes

AuthorNote
mdeslaur
same fix as CVE-2020-27766

Priority

Low

Cvss 3 Severity Score

3.3

Score breakdown

Status

Package Release Status
imagemagick
Launchpad, Ubuntu, Debian
hirsute Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
focal
Released (8:6.9.10.23+dfsg-2.1ubuntu11.4)
groovy
Released (8:6.9.10.23+dfsg-2.1ubuntu13.3)
impish Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
upstream
Released (8:6.9.11.24+dfsg-1)
bionic
Released (8:6.9.7.4+dfsg-16ubuntu6.11)
jammy Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
kinetic Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
lunar Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
trusty Needed

xenial Needed

Patches:
upstream: https://github.com/ImageMagick/ImageMagick6/commit/052175e4b190598141fbcc64641cd5ee4db3602d

Severity score breakdown

Parameter Value
Base score 3.3
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L