CVE-2026-24403
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-24

Last updated on: 2026-01-30

Assigner: GitHub, Inc.

Description
iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. In versions 2.3.1.1 and below, an integer overflow vulnerability exists in icValidateStatus CIccProfile::CheckHeader() when user-controllable input is incorporated into profile data unsafely. Tampering with tag tables, offsets, or size fields can trigger parsing errors, memory corruption, or DoS, potentially enabling arbitrary Code Execution or bypassing application logic. This issue has been fixed in version 2.3.1.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-24
Last Modified
2026-01-30
Generated
2026-05-07
AI Q&A
2026-01-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
color iccdev to 2.3.1.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24403 is an integer overflow vulnerability in the iccDEV package, specifically in the function CIccProfile::CheckHeader(). It occurs when user-controllable input is unsafely incorporated into ICC color profile data, allowing attackers to tamper with tag tables, offsets, or size fields. This can cause parsing errors, memory corruption, denial of service, or potentially enable arbitrary code execution by exploiting unsafe handling of ICC profile metadata in vulnerable native libraries. The issue was fixed in version 2.3.1.2. [1]


How can this vulnerability impact me? :

This vulnerability can lead to denial of service by causing parsing errors or memory corruption when processing malformed ICC profiles. It may also allow attackers to bypass application logic that relies on profile metadata or potentially execute arbitrary code on the affected system. Exploitation requires user interaction but no privileges, and it can be triggered remotely over the network. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying usage of vulnerable iccDEV versions (2.3.1.1 and below) and analyzing ICC profile data for malformed tag tables, offsets, or size fields that could trigger integer overflow or memory corruption. Since the issue arises during parsing of ICC profiles, you can detect suspicious or malformed ICC profiles by inspecting files or network traffic containing ICC profiles. Specific commands are not provided in the resources, but using tools like 'file' to identify ICC profiles and custom scripts to validate ICC profile structure could help. Additionally, runtime detection tools like UndefinedBehaviorSanitizer (UBSan) were used to identify the overflow during testing, which could be employed in your environment if you can run iccDEV with UBSan instrumentation. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade iccDEV to version 2.3.1.2 or later, where the vulnerability has been fixed by patch #505. No workarounds are provided, so updating to the patched version is essential to prevent exploitation. Additionally, avoid processing untrusted or user-controllable ICC profile data until the update is applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart