{
  "threat_severity" : "Moderate",
  "public_date" : "2026-02-24T01:30:58Z",
  "bugzilla" : {
    "description" : "ImageMagick: ImageMagick: Memory corruption via stack buffer overflow when processing an attribute",
    "id" : "2442125",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2442125"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-120",
  "details" : [ "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption. Versions 7.1.2-15 and 6.9.13-40 contain a patch.", "A flaw was found in ImageMagick. A remote attacker could exploit a stack buffer overflow vulnerability by providing a specially crafted image file with a long attribute value. This flaw occurs when processing an attribute in msl.c, leading to memory corruption. This can result in unpredictable behavior or a denial of service." ],
  "statement" : "A MODERATE impact stack buffer overflow flaw exists in ImageMagick. This vulnerability occurs when processing a specially crafted image file containing a long attribute value, leading to memory corruption, unpredictable behavior, or a denial of service. This affects ImageMagick as shipped in Red Hat Enterprise Linux, Fedora, and Community Projects, requiring the processing of a malicious image file for exploitation.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ImageMagick",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ImageMagick",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-25968\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-25968\nhttps://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-3mwp-xqp2-q6ph" ],
  "name" : "CVE-2026-25968",
  "mitigation" : {
    "value" : "To reduce the risk associated with this vulnerability, avoid processing untrusted or maliciously crafted image files with ImageMagick. If ImageMagick is not required for system operations, consider removing packages that depend on it. Removing ImageMagick or its dependent packages may affect applications that rely on its image processing capabilities.",
    "lang" : "en:us"
  },
  "csaw" : false
}