CVE-2020-27759

MEDIUM

Description

In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1894238

https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html

Details

Source: MITRE

Published: 2020-12-03

Updated: 2021-03-25

Type: CWE-190

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 3.3

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Impact Score: 1.4

Exploitability Score: 1.8

Severity: LOW

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
148080Debian DLA-2602-1 : imagemagick security updateNessusDebian Local Security Checks
medium
145394openSUSE Security Update : ImageMagick (openSUSE-2021-148)NessusSuSE Local Security Checks
medium
145363SUSE SLES12 Security Update : ImageMagick (SUSE-SU-2021:0199-1)NessusSuSE Local Security Checks
medium
145361openSUSE Security Update : ImageMagick (openSUSE-2021-136)NessusSuSE Local Security Checks
medium
145198SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0153-1)NessusSuSE Local Security Checks
medium
145181SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0156-1)NessusSuSE Local Security Checks
medium