First published: Wed Nov 04 2020(Updated: )
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.0.8 | <69 | 69 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 | |
ImageMagick ImageMagick | <6.9.10-69 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.8-69 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27766 is high with a score of 7.8.
CVE-2020-27766 affects ImageMagick by allowing an attacker to trigger undefined behavior.
The impacted software for CVE-2020-27766 includes various versions of ImageMagick on Ubuntu and Debian.
To fix CVE-2020-27766, update ImageMagick to the prescribed versions provided in the Ubuntu or Debian security notices.
More information about CVE-2020-27766 can be found in the MITRE CVE database as well as the Ubuntu and Debian security notices.