ImageMagick Has Signed Integer Overflow in SIXEL Decoder, Leading to Memory Corruption
Moderate severity
GitHub Reviewed
Published
Feb 23, 2026
in
ImageMagick/ImageMagick
•
Updated Mar 12, 2026
Description
Published by the National Vulnerability Database
Feb 24, 2026
Published to the GitHub Advisory Database
Mar 12, 2026
Reviewed
Mar 12, 2026
Last updated
Mar 12, 2026
A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows.
References