Impact
The vulnerability arises from a memory leak in ImageMagick’s ashlar coder when the WriteASHLARImage routine allocates resources that are not freed if an exception occurs. Although the flaw does not grant direct code execution, repeated or repeated processing of crafted images can consume system memory, potentially exhausting available resources and causing application or system downtime.
Affected Systems
ImageMagick releases prior to version 7.1.2-15 are affected. The flaw is present in the main ImageMagick library used for image conversion tasks. The associated CPE string matches the ImageMagick software, indicating all installed instances of the library before the patch are vulnerable.
Risk and Exploitability
With a CVSS score of 5.3 and an EPSS below 1%, the probability of exploitation is low, and the flaw is not currently listed in the CISA‑KEV catalog. If an attacker can supply images that trigger the exception path, the memory leak could gradually consume system resources. The attack vector is inferred to be local or remote image‑processing requests, depending on how the ImageMagick binary is exposed. The lack of an immediate exploit makes this a medium‑risk issue primarily of resource exhaustion rather than a high‑severity security breach.
OpenCVE Enrichment
Debian DSA
Github GHSA