CVE-2025-48074
BaseFortify
Publication date: 2025-08-01
Last updated on: 2025-08-13
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openexr | openexr | 3.3.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in OpenEXR version 3.3.2 involves trusting unvalidated dataWindow size values from file headers. Malicious files can exploit this by specifying excessive sizes, leading to excessive memory allocation and performance degradation when the files are processed.
How can this vulnerability impact me? :
The impact of this vulnerability includes excessive memory usage and degraded performance when processing malicious EXR files, which could potentially lead to denial of service or resource exhaustion on affected systems.
What immediate steps should I take to mitigate this vulnerability?
Update OpenEXR to version 3.3.3 or later, as this version contains the fix for the vulnerability related to unvalidated dataWindow size values that can cause excessive memory allocation and performance degradation.