First published: Mon Oct 14 2019(Updated: )
ImageMagick could allow a remote attacker to execute arbitrary code on the system, caused by a heap use-after-free in the DestroyStringInfo function in MagickCore/string.c. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 6.9.10 | <55 | 55 |
redhat/ImageMagick 7.0.8 | <55 | 55 |
IBM Data Risk Manager | <=2.0.6 | |
ImageMagick | <6.9.10-55 | |
ImageMagick | >=7.0.0-0<7.0.8-55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17541 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2019-17541, update ImageMagick to version 6.9.10-55 or later, or version 7.0.8-55 or later.
CVE-2019-17541 affects all versions of ImageMagick prior to 6.9.10-55 and versions from 7.0.0-0 up to 7.0.8-55.
An attacker can exploit CVE-2019-17541 by persuading a victim to open a specially-crafted image file.
Yes, CVE-2019-17541 is classified as a critical vulnerability due to its ability to execute arbitrary code on the affected system.