Heap-based Buffer Overflow The advisory has been revoked - it doesn't affect any version of package ImageMagick-devel  (opens in a new tab)


Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-IMAGEMAGICKDEVEL-5417798
  • published11 Apr 2023
  • disclosed2 Apr 2023

Introduced: 2 Apr 2023

CVE-2023-1906  (opens in a new tab)
CWE-122  (opens in a new tab)
CWE-125  (opens in a new tab)
CWE-787  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:7.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ImageMagick-devel package and not the ImageMagick-devel package as distributed by RHEL.

A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.