Impact
A stack buffer overflow occurs when processing the MSL attribute in ImageMagick's msl.c file. A crafted long value overflows a fixed‑size stack buffer, corrupting adjacent memory and potentially allowing an attacker to execute arbitrary code. The vulnerability is classified as buffer overflow (CWE‑120, CWE‑121, CWE‑787).
Affected Systems
ImageMagick products prior to version 7.1.2‑15 and 6.9.13‑40 are affected. Upgrade to these releases or newer to prevent the flaw. The vulnerable code is part of the ImageMagick image processing engine.
Risk and Exploitability
The CVSS score is 7.4, indicating a high severity. EPSS is very low (<1%), suggesting that widespread exploitation is unlikely at this time. The vulnerability is not listed in CISA’s KEV catalog. An attacker would need to submit a malicious image containing a specially crafted MSL attribute; successful exploitation would lead to memory corruption and possible remote code execution. Users with the aforementioned workload should therefore patch promptly.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN