{"id":"CVE-2020-27764","details":"In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.","modified":"2026-04-12T00:38:08.206327Z","published":"2020-12-03T17:15:13.037Z","related":["SUSE-SU-2021:0153-1","SUSE-SU-2021:0156-1","SUSE-SU-2021:0199-1","openSUSE-SU-2021:0136-1","openSUSE-SU-2021:0148-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894683"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"2c5f5682debda960a421db2055fd7bca04e3f356"},{"fixed":"3e21bc8a58b4ae38d24c7e283837cc279f35b6a5"}],"database_specific":{"cpe":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"6.9.10-69"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["6.9.10-0","6.9.10-1","6.9.10-10","6.9.10-11","6.9.10-12","6.9.10-13","6.9.10-14","6.9.10-15","6.9.10-16","6.9.10-17","6.9.10-18","6.9.10-19","6.9.10-2","6.9.10-20","6.9.10-21","6.9.10-22","6.9.10-23","6.9.10-24","6.9.10-25","6.9.10-26","6.9.10-27","6.9.10-28","6.9.10-29","6.9.10-3","6.9.10-30","6.9.10-31","6.9.10-32","6.9.10-33","6.9.10-34","6.9.10-35","6.9.10-36","6.9.10-37","6.9.10-38","6.9.10-39","6.9.10-4","6.9.10-40","6.9.10-41","6.9.10-42","6.9.10-43","6.9.10-44","6.9.10-45","6.9.10-46","6.9.10-47","6.9.10-48","6.9.10-49","6.9.10-5","6.9.10-50","6.9.10-51","6.9.10-52","6.9.10-53","6.9.10-54","6.9.10-55","6.9.10-56","6.9.10-57","6.9.10-58","6.9.10-59","6.9.10-6","6.9.10-60","6.9.10-61","6.9.10-62","6.9.10-63","6.9.10-64","6.9.10-65","6.9.10-66","6.9.10-67","6.9.10-68","6.9.10-7","6.9.10-8","6.9.10-9","6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","6.9.9-0","6.9.9-1","6.9.9-10","6.9.9-11","6.9.9-12","6.9.9-13","6.9.9-14","6.9.9-15","6.9.9-17","6.9.9-18","6.9.9-19","6.9.9-2","6.9.9-20","6.9.9-21","6.9.9-22","6.9.9-23","6.9.9-24","6.9.9-25","6.9.9-26","6.9.9-27","6.9.9-28","6.9.9-29","6.9.9-3","6.9.9-30","6.9.9-31","6.9.9-32","6.9.9-33","6.9.9-34","6.9.9-35","6.9.9-36","6.9.9-37","6.9.9-38","6.9.9-39","6.9.9-4","6.9.9-40","6.9.9-41","6.9.9-42","6.9.9-43","6.9.9-44","6.9.9-45","6.9.9-46","6.9.9-47","6.9.9-48","6.9.9-49","6.9.9-5","6.9.9-50","6.9.9-51","6.9.9-6","6.9.9-7","6.9.9-8","6.9.9-9"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","deprecated":false,"target":{"file":"magick/statistic.c"},"id":"CVE-2020-27764-277d6e0c","digest":{"line_hashes":["1295130928005479173690525035274294060","307311857971731158583787022821988015892","254774103318013936374300745078670626368","263592331608173445245885762948303410826","123827394284503080120235605338166004486","186143582342438894151799653608574161914","226620923899840118337092185742879739540","332314317480713092509167958093315315849","155709206610992232815726699706110317210","95266298552581258087773817072363743091","235155552411520747624982693444293396035","313778263690854973911475211076479314830","234187305782911201544726367818221735191","99416936906574150002321563265315044065","319504524987815592022485266998860435387","226985084686946558029745402912651716883","142733984988536562114748129241752818635","32819420351146543447920952424466906904","119493672099847716200315091874054986601","131340262134991582262407180617403043238"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/imagemagick/imagemagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5"}],"vanir_signatures_modified":"2026-04-12T00:38:08Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27764.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}]}