First published: Sat Mar 23 2019(Updated: )
ImageMagick is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the PopHexPixel function in coders/ps.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code, or cause a denial of service condtion on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Data Risk Manager | <=2.0.6 | |
ImageMagick ImageMagick | =7.0.8-35-q16 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 7.0.8 | <35 | 35 |
redhat/ImageMagick 6.9.10 | <35 | 35 |
ubuntu/imagemagick | <8:6.9.7.4+dfsg-16ubuntu6.7 | 8:6.9.7.4+dfsg-16ubuntu6.7 |
ubuntu/imagemagick | <8:6.9.10.8+dfsg-1ubuntu2.2 | 8:6.9.10.8+dfsg-1ubuntu2.2 |
ubuntu/imagemagick | <8:6.9.10.14+dfsg-7ubuntu2.2 | 8:6.9.10.14+dfsg-7ubuntu2.2 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1ubuntu1 | 8:6.9.10.23+dfsg-2.1ubuntu1 |
ubuntu/imagemagick | <8:6.9.10.23+dfsg-2.1 | 8:6.9.10.23+dfsg-2.1 |
ubuntu/imagemagick | <8:6.8.9.9-7ubuntu5.14 | 8:6.8.9.9-7ubuntu5.14 |
debian/imagemagick | 8:6.9.10.23+dfsg-2.1+deb10u1 8:6.9.10.23+dfsg-2.1+deb10u7 8:6.9.11.60+dfsg-1.3+deb11u2 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.12.98+dfsg1-5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for ImageMagick is CVE-2019-9956.
The severity of CVE-2019-9956 is high (8.8).
ImageMagick version 7.0.8-35 Q16 and IBM Data Risk Manager version up to 2.0.6 are affected by CVE-2019-9956.
Apply the latest patches or updates provided by the software vendors to fix the CVE-2019-9956 vulnerability.
You can find more information about CVE-2019-9956 on the MITRE CVE website, Ubuntu Security Notices, and NIST NVD.