ImageMagick has a Heap Overflow when writing extremely large image profile in the PNG encoder
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A heap buffer overflow in ImageMagick's PNG encoder when processing extremely large image profiles can lead to memory corruption and potential code execution.
Vulnerability
Overview ImageMagick, a widely used open-source image processing suite, contains a heap buffer overflow vulnerability in its PNG encoder. When an image with an extremely large profile is encoded to PNG, the software fails to properly handle the memory allocation, leading to a heap overflow [1][2][3][4]. This issue affects versions prior to 7.1.2-16 and 6.9.13-41.
Exploitation
An attacker can exploit this vulnerability by providing a crafted image file containing an oversized profile. The attack requires no special privileges beyond the ability to supply an image for processing, and user interaction is minimal (e.g., opening the file or triggering an automated conversion). The overflow occurs during the encoding phase, which can be triggered remotely if the application processes user-supplied images [4].
Impact
Successful exploitation could allow an attacker to corrupt memory, potentially leading to arbitrary code execution or denial of service. The heap overflow may overwrite adjacent data structures, enabling control flow hijacking. Given ImageMagick's use in web services, content management systems, and automated pipelines, this vulnerability poses a significant risk [3][4].
Mitigation
The vulnerability has been patched in ImageMagick versions 7.1.2-16 and 6.9.13-41. Users are strongly advised to update immediately. For those unable to upgrade, implementing strict security policies to limit image profile sizes may reduce risk, but patching is the recommended course of action [1][2].
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2026-30883
- Release Magick.NET 14.10.4 · dlemstra/Magick.NET
- Heap buffer over-write when writing extremely large image profile in the PNG encoder
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-x86NuGet | < 14.10.4 | 14.10.4 |
Affected products
2<=7.1.2-15, <=6.9.13-40+ 1 more
- (no CPE)range: <=7.1.2-15, <=6.9.13-40
- (no CPE)range: >= 7.0.0, < 7.1.2-16
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-qmw5-2p58-xvrcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-30883ghsaADVISORY
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qmw5-2p58-xvrcghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.4ghsaWEB
News mentions
0No linked articles in our index yet.