First published: Wed Nov 04 2020(Updated: )
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <6.9.10-69 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.9 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 7.0.9 | <0 | 0 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27765 is a vulnerability in ImageMagick that can be triggered by processing a crafted file, potentially leading to application availability issues.
CVE-2020-27765 has a severity value of 3.3, which is considered medium.
CVE-2020-27765 can cause undefined behavior in the form of math division by zero, which can potentially affect application availability.
To fix CVE-2020-27765, it is recommended to update ImageMagick to version 8:6.9.7.4+dfsg-16ubuntu6.11 or later.
More information about CVE-2020-27765 can be found on the CVE website, Ubuntu security notices, and NIST's vulnerability database.