Impact
ImageMagick, a widely used open‑source image manipulation library, contains a defect in versions prior to 7.1.2‑18 and 6.9.13‑43. The bug arises when the library interprets an image filename and, due to an incorrect return value on some platforms, increments a pointer beyond the end of a stack buffer. This produces an out‑of‑bounds write that can corrupt stored data and potentially compromise program integrity. The vulnerability is classified as CWE‑121 and CWE‑787.
Affected Systems
Affected installations are all ImageMagick deployments running a version earlier than 7.1.2‑18 or 6.9.13‑43, regardless of operating system. The issue is not limited to specific modules and all products that use ImageMagick’s core image‑processing routines are impacted.
Risk and Exploitability
With a CVSS score of 5.1, the risk is moderate but noteworthy, especially because the flaw involves memory corruption. Based on the description, it is inferred that an attacker would need to supply a maliciously crafted image file to a vulnerable application. No public EPSS score is available and the vulnerability is not listed in the CISA Known Exploited Vulnerability catalog, suggesting limited current exploitation. Nonetheless, the possibility of data corruption or denial of service warrants timely remediation.
OpenCVE Enrichment
Github GHSA