CVE-2020-27754

MEDIUM

Description

In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1894231

https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html

Details

Source: MITRE

Published: 2020-12-08

Updated: 2021-03-25

Type: CWE-190

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 3.3

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Impact Score: 1.4

Exploitability Score: 1.8

Severity: LOW

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
148080Debian DLA-2602-1 : imagemagick security updateNessusDebian Local Security Checks
medium
145394openSUSE Security Update : ImageMagick (openSUSE-2021-148)NessusSuSE Local Security Checks
medium
145363SUSE SLES12 Security Update : ImageMagick (SUSE-SU-2021:0199-1)NessusSuSE Local Security Checks
medium
145361openSUSE Security Update : ImageMagick (openSUSE-2021-136)NessusSuSE Local Security Checks
medium
145198SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0153-1)NessusSuSE Local Security Checks
medium
145181SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0156-1)NessusSuSE Local Security Checks
medium