First published: Wed Nov 04 2020(Updated: )
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <6.9.10-68 | |
ImageMagick ImageMagick | >=7.0.0-0<7.0.8-68 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 7.0.8 | <68 | 68 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27770 is a vulnerability in ImageMagick that allows for offset overflow in SubstituteString(), potentially impacting application availability.
CVE-2020-27770 has a severity score of 5.5, indicating a medium-level vulnerability.
ImageMagick versions prior to 8:6.9.7.4+dfsg-16ubuntu6.11, 8:6.9.10.23+dfsg-2.1ubuntu11.4, 8:6.9.10.23+dfsg-2.1ubuntu13.3, 8:6.9.11.24+dfsg-1, and 8:6.8.9.9-7ubuntu5.16+ are affected by CVE-2020-27770.
To fix CVE-2020-27770, it is recommended to update ImageMagick to version 8:6.9.7.4+dfsg-16ubuntu6.11, 8:6.9.10.23+dfsg-2.1ubuntu11.4, 8:6.9.10.23+dfsg-2.1ubuntu13.3, 8:6.9.11.24+dfsg-1, or 8:6.8.9.9-7ubuntu5.16+ depending on the version you are using.
You can find more information about CVE-2020-27770 on the official CVE page: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770