CVE-2026-24403
BaseFortify
Publication date: 2026-01-24
Last updated on: 2026-01-30
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| color | iccdev | to 2.3.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
| CWE-190 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-24403 is an integer overflow vulnerability in the iccDEV package, specifically in the function CIccProfile::CheckHeader(). It occurs when user-controllable input is unsafely incorporated into ICC color profile data, allowing attackers to tamper with tag tables, offsets, or size fields. This can cause parsing errors, memory corruption, denial of service, or potentially enable arbitrary code execution by exploiting unsafe handling of ICC profile metadata in vulnerable native libraries. The issue was fixed in version 2.3.1.2. [1]
How can this vulnerability impact me? :
This vulnerability can lead to denial of service by causing parsing errors or memory corruption when processing malformed ICC profiles. It may also allow attackers to bypass application logic that relies on profile metadata or potentially execute arbitrary code on the affected system. Exploitation requires user interaction but no privileges, and it can be triggered remotely over the network. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying usage of vulnerable iccDEV versions (2.3.1.1 and below) and analyzing ICC profile data for malformed tag tables, offsets, or size fields that could trigger integer overflow or memory corruption. Since the issue arises during parsing of ICC profiles, you can detect suspicious or malformed ICC profiles by inspecting files or network traffic containing ICC profiles. Specific commands are not provided in the resources, but using tools like 'file' to identify ICC profiles and custom scripts to validate ICC profile structure could help. Additionally, runtime detection tools like UndefinedBehaviorSanitizer (UBSan) were used to identify the overflow during testing, which could be employed in your environment if you can run iccDEV with UBSan instrumentation. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade iccDEV to version 2.3.1.2 or later, where the vulnerability has been fixed by patch #505. No workarounds are provided, so updating to the patched version is essential to prevent exploitation. Additionally, avoid processing untrusted or user-controllable ICC profile data until the update is applied. [1]