{"id":"CVE-2019-10131","details":"An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.","modified":"2026-04-11T14:11:10.709441Z","published":"2019-04-30T19:29:03.717Z","related":["SUSE-SU-2019:1712-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/108117"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4034-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00051.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"486c5d48111de1909565ed80fdbd5e56ff72e458"},{"fixed":"cb1214c124e1bd61f7dd551b94a794864861592e"}],"database_specific":{"versions":[{"introduced":"7.0.0-0"},{"fixed":"7.0.7-28"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"b80e19ed21d287d926ca114808629599089d4e04"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.9-40"}]}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","6.9.9-0","6.9.9-1","6.9.9-10","6.9.9-11","6.9.9-12","6.9.9-13","6.9.9-14","6.9.9-15","6.9.9-17","6.9.9-18","6.9.9-19","6.9.9-2","6.9.9-20","6.9.9-21","6.9.9-22","6.9.9-23","6.9.9-24","6.9.9-25","6.9.9-26","6.9.9-27","6.9.9-28","6.9.9-29","6.9.9-3","6.9.9-30","6.9.9-31","6.9.9-32","6.9.9-33","6.9.9-34","6.9.9-35","6.9.9-36","6.9.9-37","6.9.9-38","6.9.9-39","6.9.9-4","6.9.9-5","6.9.9-6","6.9.9-7","6.9.9-8","6.9.9-9","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0","7.0.7-1","7.0.7-10","7.0.7-11","7.0.7-12","7.0.7-13","7.0.7-14","7.0.7-15","7.0.7-16","7.0.7-17","7.0.7-18","7.0.7-19","7.0.7-2","7.0.7-20","7.0.7-21","7.0.7-22","7.0.7-23","7.0.7-24","7.0.7-25","7.0.7-26","7.0.7-27","7.0.7-3","7.0.7-4","7.0.7-5","7.0.7-6","7.0.7-8","7.0.7-9","7.0.7.7"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]}],"vanir_signatures":[{"target":{"function":"format8BIM","file":"coders/meta.c"},"signature_version":"v1","source":"https://github.com/imagemagick/imagemagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e","id":"CVE-2019-10131-55133e0c","signature_type":"Function","digest":{"function_hash":"9588234269115181578498912064492621498","length":2465},"deprecated":false},{"target":{"file":"coders/meta.c"},"signature_version":"v1","source":"https://github.com/imagemagick/imagemagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e","id":"CVE-2019-10131-b1def855","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["181957705159388868330456054562825076761","95653993851328839223675366880202045573","272811913007478620690302709833313147253","15865150528732214679732792869704955309"]},"deprecated":false}],"vanir_signatures_modified":"2026-04-11T14:11:10Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10131.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}