First published: Sat Jan 30 2021(Updated: )
A flaw was found in ImageMagick 7.0.10-45. A heap based buffer overflow in coders/tiff.c may result in program crash and denial of service. Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0">https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.0.10 | <45 | 45 |
ImageMagick ImageMagick | <7.0.10-45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27829 is a vulnerability in ImageMagick that may result in a program crash and denial of service due to a heap-based buffer overflow in coders/tiff.c.
CVE-2020-27829 has a severity level of medium with a CVSS score of 5.5.
ImageMagick versions up to and excluding 7.0.10-45 are affected by CVE-2020-27829.
To fix CVE-2020-27829, users should update to ImageMagick version 7.0.10-45 or later.
You can find more information about CVE-2020-27829 in the references provided: [GitHub commit](https://github.com/ImageMagick/ImageMagick/commit/6ee5059cd3ac8d82714a1ab1321399b88539abf0) and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1922526) and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1922528).