Out-of-Bounds Read Vulnerability in TIFFGetProfiles() in ImageMagick

Out-of-Bounds Read Vulnerability in TIFFGetProfiles() in ImageMagick

CVE-2020-25667 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

Learn more about our Web Application Penetration Testing UK.