First published: Tue Nov 03 2020(Updated: )
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <6.9.10-68 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.8-68 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 7.0.8 | <68 | 68 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ImageMagick flaw is CVE-2020-27758.
The severity level of CVE-2020-27758 is medium (3.3).
The flaw in coders/txt.c can lead to undefined behavior and values outside the range of type `unsigned long long`, potentially impacting application availability.
The affected versions of ImageMagick are 8:6.9.10.23+dfsg-2.1ubuntu11.4, 8:6.9.10.23+dfsg-2.1ubuntu13.3, 8:6.9.7.4+dfsg-16ubuntu6.11, 8:6.9.11.24+dfsg-1, 8:6.9.10.23+dfsg-2.1+deb10u5, 8:6.9.11.60+dfsg-1.3+deb11u1, 8:6.9.11.60+dfsg-1.6, 6.9.10-68, 7.0.8-68, and ImageMagick 7.0.8.
Yes, there are remediation steps available. Please refer to the official security notice or vendor advisories for detailed remediation information.