Vulnerability Description
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Imagemagick | Imagemagick | < 6.9.10-69 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1891613ExploitIssue TrackingPatch
- https://bugzilla.redhat.com/show_bug.cgi?id=1891613ExploitIssue TrackingPatch
FAQ
What is CVE-2020-25667?
CVE-2020-25667 is a vulnerability with a CVSS score of 5.5 (MEDIUM). TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a craf...
How severe is CVE-2020-25667?
CVE-2020-25667 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25667?
Check the references section above for vendor advisories and patch information. Affected products include: Imagemagick Imagemagick.