ImageMagick has a stack buffer overflow in MagnifyImage
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImageMagick's MagnifyImage function uses a fixed-size stack buffer that can be overflowed via a crafted image, leading to stack corruption; fixed in versions 7.1.2-16 and 6.9.13-41.
Vulnerability
Overview The vulnerability resides in the MagnifyImage function of ImageMagick, a widely-used open-source image processing suite. The function allocates a fixed-size buffer on the stack without proper bounds checking, and when processing a specially crafted image, it overwrites adjacent stack memory. This stack buffer overflow can corrupt critical data, potentially leading to arbitrary code execution or system instability. The issue affects ImageMagick versions prior to 7.1.2-16 and 6.9.13-41 [1][2].
Exploitation
An attacker can exploit this vulnerability by supplying a malicious image file to ImageMagick via any interface that triggers the MagnifyImage function. The attack can be performed remotely, requires no authentication, and no user interaction beyond processing the image (e.g., via web uploads or automated scripts). The attack complexity is low, as the overflow can be triggered with a crafted image that exceeds the expected buffer size [4].
Impact
Successful exploitation allows an attacker to corrupt the stack, which can lead to arbitrary code execution in the context of the ImageMagick process. This could enable further compromise of the system, including data theft, denial of service, or full system takeover. The CVSS score (not yet assigned by NIST) likely reflects high impacts on confidentiality, integrity, and availability due to the severity of stack corruption [4].
Mitigation
The vulnerability is patched in ImageMagick versions 7.1.2-16 and 6.9.13-41. Users are strongly advised to update their installations immediately. The fix is included in downstream packages such as Magick.NET 14.10.4 [3]. As a workaround, administrators can implement a security policy to restrict the use of MagnifyImage or avoid processing untrusted images until upgrading.
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2026-30929
- Release Magick.NET 14.10.4 · dlemstra/Magick.NET
- Stack buffer overflow in MagnifyImage
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-x86NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-arm64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-x64NuGet | < 14.10.4 | 14.10.4 |
Magick.NET-Q8-x86NuGet | < 14.10.4 | 14.10.4 |
Affected products
2<7.1.2-16, <6.9.13-41+ 1 more
- (no CPE)range: <7.1.2-16, <6.9.13-41
- (no CPE)range: >= 7.0.0, < 7.1.2-16
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-rqq8-jh93-f4vgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-30929ghsaADVISORY
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rqq8-jh93-f4vgghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.4ghsaWEB
News mentions
0No linked articles in our index yet.