CVE-2026-23876
Vulnerability
CVE-2026-23876
ImageMagick: ImageMagick: Arbitrary code execution via a crafted XBM image file
ecosystem: redhat:6A flaw was found in ImageMagick. A heap buffer overflow, a type of memory corruption, in the XBM image decoder (ReadXBMImage) allows a remote attacker to write controlled data beyond the allocated memory buffer when processing a maliciously crafted image file. This can lead to arbitrary code execution, information disclosure, or a denial of service. The vulnerability can be triggered by any operation that reads or identifies an image.
References
- secalert@redhat.com: https://access.redhat.com/security/cve/CVE-2026-23876
- secalert@redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2431038
- secalert@redhat.com: https://github.com/ImageMagick/ImageMagick/commit/2fae24192b78fdfdd27d766fd21d90aeac6ea8b8
- secalert@redhat.com: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r49w-jqq3-3gx8
- secalert@redhat.com: https://nvd.nist.gov/vuln/detail/CVE-2026-23876
- secalert@redhat.com: https://www.cve.org/CVERecord?id=CVE-2026-23876
type: vendor
source: secalert@redhat.com
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| AV | Network | |
|---|---|---|
| AC | High | |
| PR | None | |
| UI | None | |
| S | Not Changed | |
| C | High | |
| I | High | |
| A | High |
source: secalert@redhat.com
Out-of-bounds Write
source: secalert@redhat.com
published: 2026-01-20 01:01:38
modified: 2026-02-23 13:01:42
Detection
redhat-vex
OR
 
ImageMagick
package type: binary
 
ImageMagick-c++
package type: binary
 
ImageMagick-c++-devel
package type: binary
 
ImageMagick-devel
package type: binary
 
ImageMagick-doc
package type: binary
 
ImageMagick-perl
package type: binary
 
ImageMagick
package type: source
tag: rhel-6-els:bed973f4-9cfe-9d6b-4efd-5501f715a543
OR
 
ImageMagick
package type: binary
 
ImageMagick-c++
package type: binary
 
ImageMagick-c++-devel
package type: binary
 
ImageMagick-devel
package type: binary
 
ImageMagick-doc
package type: binary
 
ImageMagick-perl
package type: binary
 
ImageMagick
package type: source
tag: rhel-6-extras-including-unpatched:bed973f4-9cfe-9d6b-4efd-5501f715a543
OR
 
ImageMagick
package type: binary
 
ImageMagick-c++
package type: binary
 
ImageMagick-c++-devel
package type: binary
 
ImageMagick-devel
package type: binary
 
ImageMagick-doc
package type: binary
 
ImageMagick-perl
package type: binary
 
ImageMagick
package type: source
tag: rhel-6-including-unpatched:bed973f4-9cfe-9d6b-4efd-5501f715a543
OR
 
ImageMagick
package type: binary
 
ImageMagick-c++
package type: binary
 
ImageMagick-c++-devel
package type: binary
 
ImageMagick-devel
package type: binary
 
ImageMagick-doc
package type: binary
 
ImageMagick-perl
package type: binary
 
ImageMagick
package type: source
tag: rhel-6-supplementary:bed973f4-9cfe-9d6b-4efd-5501f715a543
Data Sources
- RedHat Enterprise Linux CSAF VEX
redhat-vex