Impact
A heap buffer overflow exists in the MVG decoder of ImageMagick that can be triggered by processing a specially crafted MVG file. The overflow causes an out‑of‑bounds write on the heap, which may corrupt adjacent memory. While the vulnerability description does not confirm arbitrary code execution, the corruption of memory could allow an attacker to compromise the integrity of the application or potentially execute malicious code if the corrupted data is interpreted as executable instructions.
Affected Systems
All releases of ImageMagick older than 7.1.2‑19 on the 7.x branch and older than 6.9.13‑44 on the 6.x branch are affected. Systems that depend on ImageMagick for processing user‑supplied images—such as web servers, content management systems, media conversion tools, or local desktop utilities—could be vulnerable if they handle an MVG file from an untrusted source.
Risk and Exploitability
The vulnerability carries a high severity score of 7.5 on the standardized scale. It is not listed in the known exploited vulnerabilities catalog, and recent exploit probability data are unavailable. The most likely attack path involves an attacker supplying a crafted MVG image to an application that accepts external image uploads or processes images from external sources. Successful exploitation could lead to memory corruption, potentially allowing further compromise of the system.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA