VYPR
Medium severity5.1GHSA Advisory· Published May 18, 2026· Updated May 18, 2026

ImageMagick: Heap Buffer Over-Read of a 4 bytes in distort operation.

CVE-2026-45624

Description

When performing a polynomial distortion an out of bounds over-read of 24 bytes can occur when specifying specific arguments.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ImageMagick has a heap buffer over-read of 24 bytes in the polynomial distortion operation, allowing information disclosure via crafted images.

Vulnerability

Overview

CVE-2026-45624 describes a heap buffer over-read vulnerability in ImageMagick's polynomial distortion operation. When specific arguments are supplied, the software reads 24 bytes beyond the allocated buffer boundary, leading to an out-of-bounds read [1][2]. This flaw resides in the core image processing library and affects multiple distributions, including the Magick.NET bindings.

Exploitation

Conditions

An attacker can exploit this vulnerability by crafting a malicious image file that triggers the polynomial distortion with specially chosen parameters. The attack vector is network-based, requires no privileges, and has low complexity, but it does require user interaction—such as opening the crafted image in an application that uses ImageMagick [2]. No authentication is needed, making it accessible to remote attackers.

Impact

The over-read can expose up to 24 bytes of adjacent heap memory, potentially leaking sensitive information such as cryptographic keys, user data, or other confidential content. The CVSS v3.1 score reflects a high confidentiality impact, while integrity and availability remain unaffected [2]. This information disclosure could serve as a stepping stone for further attacks.

Mitigation

ImageMagick has addressed this issue in versions 14.13.1 and later of the Magick.NET packages, and the underlying C library fix is included in the corresponding ImageMagick release [1]. Users are strongly advised to update to the latest patched version. No workarounds are documented, so upgrading is the recommended course of action.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.