CVE-2020-25676
CVSS V2 Medium 4.3
CVSS V3 Medium 5.5
Description
In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Overview
- CVE ID
- CVE-2020-25676
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2020-12-08T22:15:17
- Last Modified Date
- 2023-03-11T23:15:11
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* | 1 | OR | 6.9.10-69 | |
cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* | 1 | OR | 7.0.0-0 | 7.0.9-0 |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:N/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- PARTIAL
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 5.5
- Base Severity
- MEDIUM
- Exploitability Score
- 1.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1891934 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-25676 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:13:49 | Added to TrackCVE | |||
2022-12-05 17:46:32 | 2020-12-08T22:15Z | 2020-12-08T22:15:17 | CVE Published Date | updated |
2022-12-05 17:46:32 | 2021-06-02T19:37:45 | CVE Modified Date | updated | |
2022-12-05 17:46:32 | Analyzed | Vulnerability Status | updated | |
2023-03-12 00:12:23 | 2023-03-11T23:15:11 | CVE Modified Date | updated | |
2023-03-12 00:12:23 | Analyzed | Modified | Vulnerability Status | updated |
2023-03-12 00:12:25 | References | updated |