SB2026012004 - Multiple vulnerabilities in ImageMagick
Published: January 20, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2026-23952)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in MSL parser within "comment" tag before image load. A remote user can pass specially crafted data to the application and perform a denial of service (DoS) attack.
2) Heap-based buffer overflow (CVE-ID: CVE-2026-23876)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the XBM image decoder. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Stack-based buffer overflow (CVE-ID: CVE-2026-23874)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within infinite recursion in ProcessMSLScript. A local user can trigger stack-based buffer overflow and cause a denial of service condition on the target system.
4) Memory leak (CVE-ID: N/A)
The vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak in the "LoadOpenCLDeviceBenchmark()" function in MagickCore/opencl.c. A local administrator can force the application to leak memory and perform denial of service attack.
5) Release of invalid pointer or reference (CVE-ID: CVE-2026-22770)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to invalid pointer in the BilateralBlurImage method. A remote attacker can cause a denial of service condition in the target system.
Remediation
Install update from vendor's website.
References
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-5vx3-wx4q-6cj8
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r49w-jqq3-3gx8
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9vj4-wc7r-p844
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp59-x883-77qv/#poc
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-39h3-g67r-7g3c