ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A logic error in ImageMagick's YUV sampling factor validation causes a division-by-zero when loading specially crafted images, leading to denial of service via application crash.
Root
Cause
A logic error in YUV sampling factor validation can allow an invalid sampling factor to bypass the intended checks, triggering a division-by-zero at line 210 of coders/yuv.c during image processing. This flaw is present in ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 [2][4].
Attack
Vector & Exploitation
The vulnerability is exploitable when ImageMagick attempts to load a specially crafted image that supplies an invalid YUV sampling factor. No authentication is required; the attack surface is the image loading functionality accessible via the command-line tool or any application using the ImageMagick library to process untrusted image files. A crafted image file is sufficient to trigger the crash [4].
Impact
Successful exploitation leads to a reliable denial-of-service condition by crashing the ImageMagick process. The division-by-zero produces a fatal signal, terminating the process and preventing legitimate image processing tasks. This can be particularly impactful for services and applications that rely on ImageMagick for automated image handling, such as web applications, graphic design tools, and scientific image pipelines [1][2].
Mitigation
ImageMagick has addressed this vulnerability in versions 7.1.2-15 and 6.9.13-40. Users should upgrade to these patched versions or apply the available patch to their current installation. No workarounds are documented; however, limiting exposure by restricting the handling of untrusted image files can reduce risk until an upgrade is possible [2][3].
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2026-25799
- Release Magick.NET 14.10.3 · dlemstra/Magick.NET
- Division-by-Zero in YUV sampling factor validation leads to crash
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x86NuGet | < 14.10.3 | 14.10.3 |
Affected products
2<7.1.2-15, <6.9.13-40+ 1 more
- (no CPE)range: <7.1.2-15, <6.9.13-40
- (no CPE)range: >= 7.0.0, < 7.1.2-15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-543g-8grm-9cw6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25799ghsaADVISORY
- github.com/ImageMagick/ImageMagick/commit/49000e7298fbfdd759ac2c46f740f40c2e9b7452ghsaWEB
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-543g-8grm-9cw6ghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.3ghsaWEB
News mentions
0No linked articles in our index yet.