CVE-2020-27754
Summary
| CVE | CVE-2020-27754 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-08 22:15:00 UTC |
| Updated | 2023-03-11 23:15:00 UTC |
| Description | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1894231 – (CVE-2020-27754) CVE-2020-27754 ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c |
MISC |
bugzilla.redhat.com |
Exploit, Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2602-1] imagemagick security update |
MLIST |
lists.debian.org |
|
| [SECURITY] [DLA 3357-1] imagemagick security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178502 Debian Security Update for imagemagick (DLA 2602-1)
- 181625 Debian Security Update for imagemagick (DLA 3357-1)
- 198406 Ubuntu Security Notification for ImageMagick vulnerabilities (USN-4988-1)
- 671560 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1536)
- 671612 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1570)
- 671705 EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1731)
- 750398 OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0148-1)
- 750404 OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0136-1)