First published: Tue Nov 03 2020(Updated: )
In ImageMagick, there are memory leaks detected in AcquireMagickMemory. Reference: <a href="https://github.com/ImageMagick/ImageMagick/issues/1757">https://github.com/ImageMagick/ImageMagick/issues/1757</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/bb3acad195de95db86c7509d8072db01890470e0">https://github.com/ImageMagick/ImageMagick/commit/bb3acad195de95db86c7509d8072db01890470e0</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <6.9.10-69 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.9-0 | |
redhat/ImageMagick 7.0.9 | <0 | 0 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27753 is a vulnerability in the MIFF coder in /coders/miff.c in ImageMagick that can be triggered by a specially crafted input file, leading to memory leaks and potential impact to application availability or denial of service.
The severity of CVE-2020-27753 is medium, with a CVSS score of 5.5.
CVE-2020-27753 affects various versions of ImageMagick, including 8:6.9.7.4+dfsg-16ubuntu6.11, 8:6.9.10.23+dfsg-2.1ubuntu11.4, 8:6.9.10.23+dfsg-2.1ubuntu13.3, 8:6.9.11.24+dfsg-1, and 8:6.8.9.9-7ubuntu5.16+.
To fix CVE-2020-27753, it is recommended to update ImageMagick to a version that includes the necessary security patches, such as 8:6.9.7.4+dfsg-16ubuntu6.11 or later.
More information about CVE-2020-27753 can be found on the MITRE CVE website and the Ubuntu security notices: [CVE-2020-27753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753), [Ubuntu Security Notice USN-4988-1](https://ubuntu.com/security/notices/USN-4988-1), [Ubuntu Security Notice USN-5335-1](https://ubuntu.com/security/notices/USN-5335-1).