Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2602-1 imagemagick security update
Debian DLA Debian DLA DLA-3357-1 imagemagick security update
EUVD EUVD EUVD-2020-20274 Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
Ubuntu USN Ubuntu USN USN-4988-1 ImageMagick vulnerabilities
Ubuntu USN Ubuntu USN USN-5335-1 ImageMagick vulnerabilities
Ubuntu USN Ubuntu USN USN-7068-1 ImageMagick vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T16:18:45.691Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2020-27770

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-04T15:15:10.707

Modified: 2024-11-21T05:21:48.180

Link: CVE-2020-27770

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-10-05T00:00:00Z

Links: CVE-2020-27770 - Bugzilla

cve-icon OpenCVE Enrichment

No data.