CVE-2025-59733
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-19
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openexr | openexr | 8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs when decoding an OpenEXR file that uses DWAA or DWAB compression. The decoding process assumes all image channels have the same pixel type and size, and if there are four channels, they are assumed to be "B", "G", "R", and "A". However, if the main color channels are set to a 4-byte type and additional duplicate or unknown channels of a 2-byte type are added, the pointer arithmetic used during decompression can exceed the allocated buffer size, potentially leading to a buffer overflow.
How can this vulnerability impact me? :
This vulnerability can lead to a buffer overflow during the decoding of specially crafted OpenEXR files, which may cause application crashes, data corruption, or potentially allow an attacker to execute arbitrary code or cause denial of service.
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this vulnerability is to upgrade to OpenEXR version 8.0 or beyond.