{"id":"CVE-2019-13307","details":"ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.","modified":"2026-04-10T08:39:33.779866Z","published":"2019-07-05T01:15:10.687Z","related":["SUSE-SU-2019:2010-1","SUSE-SU-2019:2106-1","openSUSE-SU-2019:1983-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/4192-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4712"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4715"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/1615"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"025e77fcb2f45b21689931ba3bf74eac153afa48"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"91e58d967a92250439ede038ccfb0913a81e59fe"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"025e77fcb2f45b21689931ba3bf74eac153afa48"}]},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"91e58d967a92250439ede038ccfb0913a81e59fe"}]}],"versions":["6.9.10-0","6.9.10-1","6.9.10-10","6.9.10-11","6.9.10-12","6.9.10-13","6.9.10-14","6.9.10-15","6.9.10-16","6.9.10-17","6.9.10-18","6.9.10-19","6.9.10-2","6.9.10-20","6.9.10-21","6.9.10-22","6.9.10-23","6.9.10-24","6.9.10-25","6.9.10-26","6.9.10-27","6.9.10-28","6.9.10-29","6.9.10-3","6.9.10-30","6.9.10-31","6.9.10-32","6.9.10-33","6.9.10-34","6.9.10-35","6.9.10-36","6.9.10-37","6.9.10-38","6.9.10-39","6.9.10-4","6.9.10-40","6.9.10-41","6.9.10-42","6.9.10-43","6.9.10-44","6.9.10-45","6.9.10-46","6.9.10-47","6.9.10-48","6.9.10-49","6.9.10-5","6.9.10-6","6.9.10-7","6.9.10-8","6.9.10-9","6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","6.9.9-0","6.9.9-1","6.9.9-10","6.9.9-11","6.9.9-12","6.9.9-13","6.9.9-14","6.9.9-15","6.9.9-17","6.9.9-18","6.9.9-19","6.9.9-2","6.9.9-20","6.9.9-21","6.9.9-22","6.9.9-23","6.9.9-24","6.9.9-25","6.9.9-26","6.9.9-27","6.9.9-28","6.9.9-29","6.9.9-3","6.9.9-30","6.9.9-31","6.9.9-32","6.9.9-33","6.9.9-34","6.9.9-35","6.9.9-36","6.9.9-37","6.9.9-38","6.9.9-39","6.9.9-4","6.9.9-40","6.9.9-41","6.9.9-42","6.9.9-43","6.9.9-44","6.9.9-45","6.9.9-46","6.9.9-47","6.9.9-48","6.9.9-49","6.9.9-5","6.9.9-50","6.9.9-51","6.9.9-6","6.9.9-7","6.9.9-8","6.9.9-9","7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0","7.0.7-1","7.0.7-10","7.0.7-11","7.0.7-12","7.0.7-13","7.0.7-14","7.0.7-15","7.0.7-16","7.0.7-17","7.0.7-18","7.0.7-19","7.0.7-2","7.0.7-20","7.0.7-21","7.0.7-22","7.0.7-23","7.0.7-24","7.0.7-25","7.0.7-26","7.0.7-27","7.0.7-28","7.0.7-29","7.0.7-3","7.0.7-30","7.0.7-31","7.0.7-32","7.0.7-33","7.0.7-34","7.0.7-35","7.0.7-36","7.0.7-37","7.0.7-38","7.0.7-39","7.0.7-4","7.0.7-5","7.0.7-6","7.0.7-8","7.0.7-9","7.0.7.7","7.0.8-0","7.0.8-1","7.0.8-10","7.0.8-11","7.0.8-12","7.0.8-13","7.0.8-14","7.0.8-15","7.0.8-16","7.0.8-17","7.0.8-18","7.0.8-19","7.0.8-2","7.0.8-20","7.0.8-21","7.0.8-22","7.0.8-23","7.0.8-24","7.0.8-25","7.0.8-26","7.0.8-27","7.0.8-28","7.0.8-29","7.0.8-3","7.0.8-30","7.0.8-31","7.0.8-32","7.0.8-33","7.0.8-34","7.0.8-35","7.0.8-36","7.0.8-37","7.0.8-38","7.0.8-39","7.0.8-4","7.0.8-40","7.0.8-41","7.0.8-42","7.0.8-43","7.0.8-44","7.0.8-45","7.0.8-46","7.0.8-47","7.0.8-48","7.0.8-49","7.0.8-5","7.0.8-6","7.0.8-7","7.0.8-8","7.0.8-9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0.8-50-q16"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13307.json","vanir_signatures_modified":"2026-04-10T08:39:33Z","vanir_signatures":[{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"227183710927715851385752933276828651301","length":780},"source":"https://github.com/imagemagick/imagemagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe","id":"CVE-2019-13307-e480b35e","signature_type":"Function","target":{"file":"magick/statistic.c","function":"AcquirePixelThreadSet"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["105457957266992163600397784467911012864","113502714572540751338282177106943565411","131352766856713130247136133288259088806","208351102372676431955061896583642085284","221470689196922184248347942481580364275","167966186430876343356799793379607260243","180510603992647546579305887327561640057","84568744422222018656790852240493698893","290008347618620899133113066805843581428","205213132471849264631113514132271626040","157068344437711510051371991859456164162","187064918045232381902598238192910610583","242562180137500128837313806753247771133","279878274855968029922299685470369274421"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48","id":"CVE-2019-13307-eb1d490d","signature_type":"Line","target":{"file":"MagickCore/statistic.c"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["57063751727762952091049005679334265917","113502714572540751338282177106943565411","279342851013028598906720271822326764308","333090040705412081734891161475359584319","166591158397969553092131162797869008206","151124482436635167576724954410633580608","326394045144129747231328685586249213587","260290302060196939174424994031801759807","156181899458264737788216578542038925836","205213132471849264631113514132271626040","157068344437711510051371991859456164162","187064918045232381902598238192910610583","78134888531581652395640578558054048094","144916994949891328611276888500568223318"],"threshold":0.9},"source":"https://github.com/imagemagick/imagemagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe","id":"CVE-2019-13307-edb17fcd","signature_type":"Line","target":{"file":"magick/statistic.c"}},{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"287821828239848222157026039943782817642","length":871},"source":"https://github.com/imagemagick/imagemagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48","id":"CVE-2019-13307-ee575a47","signature_type":"Function","target":{"file":"MagickCore/statistic.c","function":"AcquirePixelThreadSet"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}