Home

Description

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffer Overflow vulnerability in CIccTagNamedColor2::SetSize(). This occurs when user-controllable input is unsafely incorporated into ICC profile data or other structured binary blobs. Successful exploitation may allow an attacker to perform DoS, manipulate data, bypass application logic and Code Execution. This issue has been fixed in version 2.3.1.2.

PUBLISHED Reserved 2026-01-22 | Published 2026-01-24 | Updated 2026-01-24 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-20: Improper Input Validation

CWE-122: Heap-based Buffer Overflow

Product status

< 2.3.1.2
affected

References

github.com/...iccDEV/security/advisories/GHSA-h9h3-45cm-j95f

github.com/InternationalColorConsortium/iccDEV/issues/480

github.com/...ommit/90c71cba2c563b1f5dc84197f827540d1baaea67

cve.org (CVE-2026-24406)

nvd.nist.gov (CVE-2026-24406)

Download JSON