CVE-2026-33900
Received Received - Intake
Integer Overflow in ImageMagick VIFF Encoder Causes Heap Corruption

Publication date: 2026-04-13

Last updated on: 2026-04-17

Assigner: GitHub, Inc.

Description
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, the viff encoder contains an integer truncation/wraparound issue on 32-bit builds that could trigger an out of bounds heap write, potentially causing a crash. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
imagemagick imagemagick to 6.9.13-44 (exc)
imagemagick imagemagick From 7.0.0-0 (inc) to 7.1.2-19 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ImageMagick versions below 7.1.2-189 and 6.9.13-44, specifically in the viff encoder on 32-bit builds. It involves an integer truncation or wraparound issue that can lead to an out of bounds heap write.

Such an out of bounds heap write can potentially cause the program to crash.

The issue has been fixed in versions 6.9.13-44 and 7.1.2-19.


How can this vulnerability impact me? :

The vulnerability can cause ImageMagick to crash due to an out of bounds heap write triggered by the integer truncation/wraparound issue in the viff encoder on 32-bit builds.

This could lead to denial of service if the software is used in an environment where image processing is critical.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade ImageMagick to version 6.9.13-44 or later, or version 7.1.2-19 or later, where the issue has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart