First published: Tue Dec 24 2019(Updated: )
ImageMagick is vulnerable to a heap-based buffer overflow, caused by a flaw in the WriteSGIImage function in coders/sgi.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 7.0.8 | <43 | 43 |
redhat/ImageMagick 6.9.10 | <43 | 43 |
IBM Data Risk Manager | <=2.0.6 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 | |
ImageMagick | =7.0.8-43-q16 | |
Ubuntu | =20.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19948 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2019-19948, upgrade to the patched versions of ImageMagick or apply the appropriate updates from your distribution.
CVE-2019-19948 affects multiple versions of ImageMagick, including versions up to 7.0.8-43.
Yes, exploiting CVE-2019-19948 can allow a remote attacker to execute arbitrary code on a vulnerable system.
Yes, proof of concept examples related to CVE-2019-19948 can be found on various security-focused platforms.