Home

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, a memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects. Integer overflow and unchecked allocation in InputFile.channel() and InputFile.channels() can lead to heap overflow (32 bit) or a NULL deref (64 bit). Versions 3.2.5, 3.3.6, and 3.4.3 contain a patch for the issue.

PUBLISHED Reserved 2025-10-28 | Published 2025-11-10 | Updated 2025-11-14 | Assigner GitHub_M




MEDIUM: 5.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

>= 3.2.0, < 3.2.5
affected

>= 3.3.0, < 3.3.6
affected

>= 3.4.0, < 3.4.3
affected

References

github.com/...penexr/security/advisories/GHSA-vh63-9mqx-wmjr exploit

github.com/...penexr/security/advisories/GHSA-vh63-9mqx-wmjr

github.com/...b16ec3c5/src/wrappers/python/PyOpenEXR_old.cpp

cve.org (CVE-2025-64182)

nvd.nist.gov (CVE-2025-64182)

Download JSON