Home

Description

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, a heap buffer over-read when the strlen() function attempts to read a non-null-terminated buffer potentially leaking heap memory contents and causing application termination. This vulnerability affects users of the iccDEV library who process ICC color profiles. ICC Profile Injection vulnerabilities arise when user-controllable input is incorporated into ICC profile data or other structured binary blobs in an unsafe manner. Version 2.3.1.2 contains a fix for the issue. No known workarounds are available.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-28 | Updated 2026-01-28 | Assigner GitHub_M




MEDIUM: 6.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

Problem types

CWE-122: Heap-based Buffer Overflow

CWE-125: Out-of-bounds Read

CWE-170: Improper Null Termination

Product status

< 2.3.1.2
affected

References

github.com/...iccDEV/security/advisories/GHSA-q8g2-mp32-3j7f

github.com/InternationalColorConsortium/iccDEV/pull/540

github.com/...ommit/3092499cd4d0775f4a716b999899f9c26f9bc614

cve.org (CVE-2026-24852)

nvd.nist.gov (CVE-2026-24852)

Download JSON