SB2025091155 - Debian update for imagemagick
Published: September 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2025-55004)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error when performing image magnification in ReadOneMNGIMage. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and gain access to sensitive information on the target system.
2) Heap-based buffer overflow (CVE-ID: CVE-2025-55005)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in log colorspace handling. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and cause a denial of service condition on the target system.
3) Integer overflow (CVE-ID: CVE-2025-55154)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in MNG magnification. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Division by zero (CVE-ID: CVE-2025-55212)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the divide-by-zero issue in ThumbnailImage via montage -geometry. A remote attacker can pass specially crafted input to the application and cause a denial of service condition on the target system.
5) Format string error (CVE-ID: CVE-2025-55298)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a format string error in the "InterpretImageFilename" function. A remote user can supply a specially crafted input that contains format string specifiers and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Integer overflow (CVE-ID: CVE-2025-57803)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in the BMP encoder’s scanline-stride computation. A remote user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Out-of-bounds write (CVE-ID: CVE-2025-57807)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the WriteBlobStream() function in MagickCore/blob.c. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.