Impact
ImageMagick processes images for the XWD format using a bytes per line calculation that overflows a 32‑bit unsigned integer. The overflow reduces the heap allocation size and allows an out‑of‑bounds write when a very large image is handled, creating a heap buffer overflow (CWE‑122) that can corrupt memory or, due to the unsigned arithmetic error, potentially allow arbitrary code execution (CWE‑190).
Affected Systems
All ImageMagick releases older than 7.1.2‑16 and 6.9.13‑41 built with the XWD encoder are affected, regardless of platform.
Risk and Exploitability
With a CVSS score of 6.8 the vulnerability is of moderate severity, and the EPSS score of less than 1% indicates a low probability of broad exploitation at the moment. The vulnerability is not listed in the CISA KEV catalog. The most likely attack scenario involves an adversary supplying a specially crafted, extremely large image file to an application that uses ImageMagick, triggering the heap overflow and potentially giving the attacker code execution or causing a crash. No documented network‑only vector exists, so the attacker must be able to deliver the malicious image data to the vulnerable program.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA