CVE-2025-66628
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| imagemagick | imagemagick | 7.1.2-10 |
| imagemagick | imagemagick | 7.1.2-9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a critical integer overflow in the TIM image parser of ImageMagick versions 7.1.2-9 and earlier. The parser reads 16-bit width and height values from an image file and calculates the image size by multiplying these values. On 32-bit systems, this multiplication can overflow, causing the program to allocate less memory than needed. This leads to out-of-bounds memory reads when processing the image, potentially causing crashes or other unexpected behavior.
How can this vulnerability impact me? :
The vulnerability can lead to out-of-bounds memory reads, which may cause the application to crash or behave unpredictably. Since the CVSS score indicates a high confidentiality impact, it could potentially allow an attacker to read sensitive information from memory, leading to information disclosure.
What immediate steps should I take to mitigate this vulnerability?
Upgrade ImageMagick to version 7.1.2-10 or later, where the integer overflow vulnerability in the TIM image parser is fixed.