{"api_version":"1","generated_at":"2026-04-23T06:19:08+00:00","cve":"CVE-2020-27754","urls":{"html":"https://cve.report/CVE-2020-27754","api":"https://cve.report/api/cve/CVE-2020-27754.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-27754","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-27754"},"summary":{"title":"CVE-2020-27754","description":"In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-12-08 22:15:00","updated_at":"2023-03-11 23:15:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894231","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1894231","refsource":"MISC","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"title":"1894231 – (CVE-2020-27754) CVE-2020-27754 ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html","name":"[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2602-1] imagemagick security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html","name":"[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3357-1] imagemagick security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-27754","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27754","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"27754","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27754","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"imagemagick","cpe5":"imagemagick","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27754","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"imagemagick","cpe5":"imagemagick","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-27754","qid":"178502","title":"Debian Security Update for imagemagick (DLA 2602-1)"},{"cve":"CVE-2020-27754","qid":"181625","title":"Debian Security Update for imagemagick (DLA 3357-1)"},{"cve":"CVE-2020-27754","qid":"198406","title":"Ubuntu Security Notification for ImageMagick vulnerabilities (USN-4988-1)"},{"cve":"CVE-2020-27754","qid":"671560","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1536)"},{"cve":"CVE-2020-27754","qid":"671612","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1570)"},{"cve":"CVE-2020-27754","qid":"671705","title":"EulerOS Security Update for ImageMagick (EulerOS-SA-2022-1731)"},{"cve":"CVE-2020-27754","qid":"750398","title":"OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0148-1)"},{"cve":"CVE-2020-27754","qid":"750404","title":"OpenSUSE Security Update for ImageMagick (openSUSE-SU-2021:0136-1)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-27754","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"ImageMagick","version":{"version_data":[{"version_value":"prior to 6.9.10-69"},{"version_value":"prior to 7.0.8-69"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-190"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1894231","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894231"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"}]},"description":{"description_data":[{"lang":"eng","value":"In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69."}]}},"nvd":{"publishedDate":"2020-12-08 22:15:00","lastModifiedDate":"2023-03-11 23:15:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":3.3,"baseSeverity":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9.10-69","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.8","versionEndExcluding":"7.0.8-69","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"27754","Ordinal":"189490","Title":"CVE-2020-27754","CVE":"CVE-2020-27754","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"27754","Ordinal":"1","NoteData":"In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"27754","Ordinal":"2","NoteData":"2020-12-08","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"27754","Ordinal":"3","NoteData":"2021-03-23","Type":"Other","Title":"Modified"}]}}}