CVE-2020-25667Heap-based Buffer Overflow in Imagemagick

Severity
5.5MEDIUMNVD
EPSS
0.2%
top 63.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8
Latest updateMay 24

Description

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDimagemagick/imagemagick7.0.0-07.0.9-0+1
CVEListV5imagemagick/imagemagickprior to 7.0.9-0

Patches

🔴Vulnerability Details

1
GHSA
GHSA-3hx9-jrq9-5mh9: TIFFGetProfiles() in /coders/tiff2022-05-24

📋Vendor Advisories

2
Debian
CVE-2020-25667: imagemagick - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-b...2020
Red Hat
ImageMagick: heap-based buffer overflow in TIFFGetProfiles in coders/tiff.c2019-10-13

💬Community

1
Bugzilla
CVE-2020-25667 ImageMagick: heap-based buffer overflow in TIFFGetProfiles in coders/tiff.c2020-10-26