![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27758
https://notcve.org/view.php?id=CVE-2020-27758
08 Dec 2020 — A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. Se encontró uno fallo en ImageMagick en el archivo coders/txt.c. • https://bugzilla.redhat.com/show_bug.cgi?id=1894236 • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27757
https://notcve.org/view.php?id=CVE-2020-27757
08 Dec 2020 — A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick vers... • https://bugzilla.redhat.com/show_bug.cgi?id=1894234 • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27756 – Ubuntu Security Notice USN-4988-1
https://notcve.org/view.php?id=CVE-2020-27756
08 Dec 2020 — In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0. En la función ParseMetaGeometry() del ... • https://bugzilla.redhat.com/show_bug.cgi?id=1894233 • CWE-369: Divide By Zero •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25665
https://notcve.org/view.php?id=CVE-2020-25665
08 Dec 2020 — The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. • https://bugzilla.redhat.com/show_bug.cgi?id=1891606 • CWE-122: Heap-based Buffer Overflow CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-29599 – ImageMagick: Shell injection via PDF password could result in arbitrary code execution
https://notcve.org/view.php?id=CVE-2020-29599
07 Dec 2020 — ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c. ImageMagick versiones anteriores a 6.9.11-40 y versiones 7.x anteriores a 7.0.10-40 maneja inapropiadamente la opción -authenticate, que permite establecer una contraseña para archivos PDF protegidos con con... • https://github.com/coco0x0a/CVE-2020-29599 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-91: XML Injection (aka Blind XPath Injection) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27776 – Ubuntu Security Notice USN-7068-1
https://notcve.org/view.php?id=CVE-2020-27776
04 Dec 2020 — A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. Se encontró un fallo en ImageMagick en el archivo MagickCore/statistic.c. • https://bugzilla.redhat.com/show_bug.cgi?id=1898304 • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27773
https://notcve.org/view.php?id=CVE-2020-27773
04 Dec 2020 — A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. Se encontró un fallo en ImageMagick en el archivo MagickCore... • https://bugzilla.redhat.com/show_bug.cgi?id=1898295 • CWE-369: Divide By Zero •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27770 – Ubuntu Security Notice USN-5335-1
https://notcve.org/view.php?id=CVE-2020-27770
04 Dec 2020 — Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. Debido a la falta de comprobación para el valor 0 de "replace_extent", es posible que el desplazamiento "p" se desborde en la función SubstituteString(), lo que podría afectar la disponibilidad de ... • https://bugzilla.redhat.com/show_bug.cgi?id=1894691 • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27771
https://notcve.org/view.php?id=CVE-2020-27771
04 Dec 2020 — In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impa... • https://bugzilla.redhat.com/show_bug.cgi?id=1898290 • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27767
https://notcve.org/view.php?id=CVE-2020-27767
04 Dec 2020 — A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. Se encontró un fallo en ImageMagick en el archivo MagickCore/quantum.h. • https://bugzilla.redhat.com/show_bug.cgi?id=1894687 • CWE-190: Integer Overflow or Wraparound •