Description
There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2602-1 | imagemagick security update |
Debian DLA |
DLA-3357-1 | imagemagick security update |
EUVD |
EUVD-2020-18328 | There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0. |
Ubuntu USN |
USN-4988-1 | ImageMagick vulnerabilities |
Ubuntu USN |
USN-7068-1 | ImageMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T15:40:36.313Z
Reserved: 2020-09-16T00:00:00.000Z
Link: CVE-2020-25666
No data.
Status : Modified
Published: 2020-12-08T21:15:12.623
Modified: 2024-11-21T05:18:24.197
Link: CVE-2020-25666
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN