Out-of-bounds Read Affecting imagemagick-dev package, versions <7.1.2.0-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-IMAGEMAGICKDEV-14407182
  • published13 Dec 2025
  • disclosed10 Dec 2025

Introduced: 10 Dec 2025

CVE-2025-66628  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Minimos:latest imagemagick-dev to version 7.1.2.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream imagemagick-dev package and not the imagemagick-dev package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.

CVSS Base Scores

version 3.1