Impact
ImageMagick, a widely-used image processing library, contains an integer overflow in its SIXEL decoder. The overflow can lead to an out-of-bounds write when a specially crafted image is parsed, potentially corrupting memory and causing crashes or enabling an attacker to execute arbitrary code. This vulnerability otherwise remains a local flaw that can be triggered by any entity able to influence image decoding, such as a user, a network service, or a malicious third‑party resource.
Affected Systems
The flaw affects the ImageMagick software family, specifically all releases prior to version 7.1.2‑16. Systems running any earlier 7.x series or previous major releases are vulnerable if they compile or ship the legacy decoder component and accept external image input.
Risk and Exploitability
The CVSS base score of 6.5 indicates a moderate severity, and the EPSS of less than 1% signals a very low but non‑zero likelihood of exploitation. ImageMagick is not listed in the CISA KEV catalog, suggesting no publicly known active exploitation at the time of analysis. The attack vector is inferred to be a malformed image received or processed locally or by a service that uses ImageMagick, which can trigger the out‑of‑bounds write without requiring elevated privileges.
OpenCVE Enrichment
Debian DSA
Github GHSA