We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48071

OpenEXR's Forged Unpacked Size can Lead to Heap-Based Buffer Overflow in Deep Scanline Parsing



Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3.

Reserved 2025-05-15 | Published 2025-07-31 | Updated 2025-07-31 | Assigner GitHub_M


HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

>= 3.3.0, < 3.3.3
affected

References

github.com/...penexr/security/advisories/GHSA-h45x-qhg2-q375

github.com/...ommit/916cc729e24aa16b86d82813f6e136340ab2876f

github.com/...SoftwareFoundation/openexr/releases/tag/v3.3.3

cve.org (CVE-2025-48071)

nvd.nist.gov (CVE-2025-48071)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48071

Support options

Helpdesk Chat, Email, Knowledgebase