Impact
ImageMagick’s internal SVG decoder performs an off‑by‑one boundary check that allows an attacker to supply a crafted SVG file. The bug causes an undefined cast from a signed to an unsigned size type, leading to an integer overflow or wrap‑around. When triggered this flaw can exhaust resources or cause the image processing thread to terminate, resulting in a denial of service. There is no evidence of confidentiality or integrity compromise from this flaw.
Affected Systems
The vulnerability is present in all ImageMagick releases prior to 7.1.2‑15 and 6.9.13‑40, regardless of version number, and is fixed in those two releases and later. The affected vendor is ImageMagick, product ImageMagick.
Risk and Exploitability
The CVSS score of 7.5 reflects a high‑impact flaw, while the EPSS score of less than 1 % indicates a low probability of exploitation at this time. The flaw is not listed in CISA’s KEV catalog. The likely attack vector involves an application or service that processes user‑supplied SVG content through ImageMagick; if the SVG is delivered to the target, the flaw can be triggered without authentication or elevated privileges, but it requires the victim to import or render the malformed image.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA