First published: Sat Mar 23 2019(Updated: )
ImageMagick is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the PopHexPixel function in coders/ps.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code, or cause a denial of service condtion on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.8-35-q16 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 7.0.8 | <35 | 35 |
redhat/ImageMagick 6.9.10 | <35 | 35 |
IBM Data Risk Manager | <=2.0.6 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 8:7.1.1.39+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for ImageMagick is CVE-2019-9956.
The severity of CVE-2019-9956 is high (8.8).
ImageMagick version 7.0.8-35 Q16 and IBM Data Risk Manager version up to 2.0.6 are affected by CVE-2019-9956.
Apply the latest patches or updates provided by the software vendors to fix the CVE-2019-9956 vulnerability.
You can find more information about CVE-2019-9956 on the MITRE CVE website, Ubuntu Security Notices, and NIST NVD.