First published: Tue Dec 24 2019(Updated: )
ImageMagick is vulnerable to a heap-based buffer overflow, caused by a flaw in the WritePNGImage function in coders/png.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick 6.9.10 | <43 | 43 |
redhat/ImageMagick 7.0.8 | <43 | 43 |
IBM Data Risk Manager | <=2.0.6 | |
ImageMagick | >=6.9.9-33<6.9.10-43 | |
ImageMagick | >=7.0.7-23<7.0.8-43 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Ubuntu | =20.04 | |
SUSE Linux | =15.1 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.43+dfsg1-1 8:7.1.1.46+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19949 has a high severity score due to the potential for remote code execution via a heap-based buffer overflow.
To fix CVE-2019-19949, update ImageMagick to version 6.9.10-43 or 7.0.8-43 or later.
CVE-2019-19949 affects ImageMagick versions up to 6.9.10-43 and 7.0.8-43, as well as specific versions of IBM Data Risk Manager.
CVE-2019-19949 is a heap-based buffer overflow vulnerability affecting the WritePNGImage function.
Yes, CVE-2019-19949 can be exploited remotely by tricking a victim into opening a specially-crafted PNG file.