Impact
ImageMagick contains an integer overflow in the DIB image coder that allows an attacker to craft a malformed DIB file, causing the program to read beyond allocated memory or write out of bounds. This memory corruption can lead to an application crash (denial of service) and, based on the nature of the flaw, may also create an opportunity for arbitrary code execution. The possibility of code execution is inferred from the type of buffer overflow described by the associated CWEs, but the CVE entry itself does not confirm a published exploit.
Affected Systems
The vulnerability affects all versions of ImageMagick prior to 7.1.2‑16 and 6.9.13‑41. Many installations on Linux, Windows and macOS systems may still be running these older releases and may process image files provided by external or untrusted sources.
Risk and Exploitability
The CVSS base score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is the ingestion of a specially crafted DIB image through any application or service that calls ImageMagick to decode images. This inference is based on the observation that the flaw is triggered by malformed image data.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA