4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
0.001 Low
EPSS
Percentile
33.7%
In IntensityCompare() of /magick/quantize.c, there are calls to
PixelPacketIntensity() which could return overflowed values to the caller
when ImageMagick processes a crafted input file. To mitigate this, the
patch introduces and uses the ConstrainPixelIntensity() function, which
forces the pixel intensities to be within the proper bounds in the event of
an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and
7.0.8-69.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | imagemagick | < 8:6.9.7.4+dfsg-16ubuntu6.11 | UNKNOWN |
ubuntu | 20.04 | noarch | imagemagick | < 8:6.9.10.23+dfsg-2.1ubuntu11.4 | UNKNOWN |
ubuntu | 20.10 | noarch | imagemagick | < 8:6.9.10.23+dfsg-2.1ubuntu13.3 | UNKNOWN |
ubuntu | 14.04 | noarch | imagemagick | < any | UNKNOWN |
ubuntu | 16.04 | noarch | imagemagick | < any | UNKNOWN |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
0.001 Low
EPSS
Percentile
33.7%