CVE-2020-25676
Ubuntu Security Notice USN-7068-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
En CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels() e InterpolatePixelInfo(), que son todas funciones en el archivo /MagickCore/pixel.c, había varios cálculos de desplazamiento de píxeles sin restricciones que se estaban utilizando con la función floor(). Estos cálculos produjeron un comportamiento indefinido en forma de desbordamientos de enteros y fuera de rango, según lo identificado por UndefinedBehaviorSanitizer. Estas instancias de comportamiento indefinido podrían ser desencadenadas por un atacante que pueda suministrar un archivo de entrada diseñado para ser procesado por ImageMagick. Estos problemas podrían afectar la disponibilidad de la aplicación o potencialmente causar otros problemas relacionados con el comportamiento indefinido. Este fallo afecta a ImageMagick versiones anteriores a 7.0.9-0
It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into processing a specially crafted file, an attacker could exploit this to cause a denial of service or affect the reliability of the system. The vulnerabilities included memory leaks, buffer overflows, and improper handling of pixel data.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-16 CVE Reserved
- 2020-12-08 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1891934 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Imagemagick Search vendor "Imagemagick" | Imagemagick Search vendor "Imagemagick" for product "Imagemagick" | < 6.9.10-69 Search vendor "Imagemagick" for product "Imagemagick" and version " < 6.9.10-69" | - |
Affected
| ||||||
Imagemagick Search vendor "Imagemagick" | Imagemagick Search vendor "Imagemagick" for product "Imagemagick" | >= 7.0.0-0 < 7.0.9-0 Search vendor "Imagemagick" for product "Imagemagick" and version " >= 7.0.0-0 < 7.0.9-0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|