First published: Mon Jul 29 2024(Updated: )
ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <7.1.1-36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41817 is rated as important due to potential exploitation risks in the ImageMagick AppImage version.
To fix CVE-2024-41817, ensure that you update ImageMagick to the latest version beyond 7.1.1-36 where the vulnerability has been addressed.
CVE-2024-41817 affects the ImageMagick software suite specifically in its AppImage distribution.
The vulnerability in CVE-2024-41817 is caused by the use of an empty path when setting the 'MAGICK_CONFIGURE_PATH' and 'LD_LIBRARY_PATH' environment variables during execution.
Yes, CVE-2024-41817 can potentially be exploited remotely depending on how the ImageMagick AppImage is utilized in applications.