CVE-2020-25667
Summary
| CVE | CVE-2020-25667 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-08 21:15:00 UTC |
| Updated | 2023-11-07 03:20:00 UTC |
| Description | TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1891613 – (CVE-2020-25667) CVE-2020-25667 ImageMagick: heap-based buffer overflow in TIFFGetProfiles in coders/tiff.c |
MISC |
bugzilla.redhat.com |
Exploit, Issue Tracking, Patch, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671560 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1536)
- 671612 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1570)
- 671705 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1731)