{"api_version":"1","generated_at":"2026-04-23T03:06:01+00:00","cve":"CVE-2020-27751","urls":{"html":"https://cve.report/CVE-2020-27751","api":"https://cve.report/api/cve/CVE-2020-27751.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-27751","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-27751"},"summary":{"title":"CVE-2020-27751","description":"A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-12-08 22:15:00","updated_at":"2023-03-11 23:15:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891994","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1891994","refsource":"MISC","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"title":"1891994 – (CVE-2020-27751) CVE-2020-27751 ImageMagick: integer overflow in MagickCore/quantum-export.c","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html","name":"[debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2672-1] imagemagick security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html","name":"[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3357-1] imagemagick security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-27751","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27751","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"27751","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27751","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"imagemagick","cpe5":"imagemagick","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27751","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"imagemagick","cpe5":"imagemagick","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-27751","qid":"178654","title":"Debian Security Update for imagemagick (DLA 2672-1)"},{"cve":"CVE-2020-27751","qid":"181625","title":"Debian Security Update for imagemagick (DLA 3357-1)"},{"cve":"CVE-2020-27751","qid":"198406","title":"Ubuntu Security Notification for ImageMagick vulnerabilities (USN-4988-1)"},{"cve":"CVE-2020-27751","qid":"671560","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1536)"},{"cve":"CVE-2020-27751","qid":"671612","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1570)"},{"cve":"CVE-2020-27751","qid":"671705","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1731)"},{"cve":"CVE-2020-27751","qid":"750398","title":"OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0148-1)"},{"cve":"CVE-2020-27751","qid":"750404","title":"OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0136-1)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-27751","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"ImageMagick","version":{"version_data":[{"version_value":"prior to 7.0.9-0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-190"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1891994","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891994"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"}]},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0."}]}},"nvd":{"publishedDate":"2020-12-08 22:15:00","lastModifiedDate":"2023-03-11 23:15:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":3.3,"baseSeverity":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9.10-69","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0-0","versionEndExcluding":"7.0.9-0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"27751","Ordinal":"189487","Title":"CVE-2020-27751","CVE":"CVE-2020-27751","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"27751","Ordinal":"1","NoteData":"A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"27751","Ordinal":"2","NoteData":"2020-12-08","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"27751","Ordinal":"3","NoteData":"2021-06-03","Type":"Other","Title":"Modified"}]}}}