Impact
WriteUHDRImage in ImageMagick computes the pixel buffer size using 32‑bit signed arithmetic. When a UHDR image with large dimensions is processed, the multiplication overflows, causing a buffer that is too small to be allocated. The resulting out‑of‑bounds write can corrupt heap memory, crash the image processing process. This flaw is identified as a heap buffer overflow and an integer overflow (CWE‑122 and CWE‑190).
Affected Systems
ImageMagick software, all releases prior to version 7.1.2‑15. Versions 7.1.2‑15 and later contain the patch that prevents the signed integer overflow and protects buffer allocation.
Risk and Exploitability
The vulnerability scores a 8.2 on CVSS, indicating high severity, but the EPSS score is reported as less than 1%, showing a very low likelihood of opportunistic exploitation. The flaw is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would need to supply a malicious UHDR image with sufficiently large dimensions to trigger the overflow; therefore the likely attack vector is a local or privileged process that processes crafted images.
OpenCVE Enrichment
Debian DSA
Github GHSA