A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1898296 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html | Mailing List Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2020-12-04 21:15
Updated : 2023-03-11 23:15
NVD link : CVE-2020-27774
Mitre link : CVE-2020-27774
CVE.ORG link : CVE-2020-27774
JSON object : View
Products Affected
                debian
- debian_linux
 
redhat
- enterprise_linux
 
imagemagick
- imagemagick
 
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
