Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-27754
HistoryDec 08, 2020 - 12:00 a.m.

CVE-2020-27754

2020-12-0800:00:00
ubuntu.com
ubuntu.com
6

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.9%

In IntensityCompare() of /magick/quantize.c, there are calls to
PixelPacketIntensity() which could return overflowed values to the caller
when ImageMagick processes a crafted input file. To mitigate this, the
patch introduces and uses the ConstrainPixelIntensity() function, which
forces the pixel intensities to be within the proper bounds in the event of
an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and
7.0.8-69.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchimagemagick< 8:6.9.7.4+dfsg-16ubuntu6.11UNKNOWN
ubuntu20.04noarchimagemagick< 8:6.9.10.23+dfsg-2.1ubuntu11.4UNKNOWN
ubuntu20.10noarchimagemagick< 8:6.9.10.23+dfsg-2.1ubuntu13.3UNKNOWN
ubuntu14.04noarchimagemagick< anyUNKNOWN
ubuntu16.04noarchimagemagick< anyUNKNOWN

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.9%