CVE-2026-34534
Received Received - Intake
Heap Buffer Overflow in iccDEV ICC Profile Parsing (Pre

Publication date: 2026-03-31

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a heap-buffer-overflow (HBO) in CIccMpeSpectralMatrix::Describe(). The issue is observable under AddressSanitizer as an out-of-bounds heap read when running iccDumpProfile on a malicious profile. This issue has been patched in version 2.3.1.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
color iccdev to 2.3.1.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in iccDEV, a set of libraries and tools for working with ICC color management profiles. Before version 2.3.1.6, a specially crafted ICC profile could cause a heap-buffer-overflow (HBO) in the function CIccMpeSpectralMatrix::Describe(). This means that when processing a malicious ICC profile, the software might read memory outside the allocated heap buffer, which is detected as an out-of-bounds heap read by AddressSanitizer when running the iccDumpProfile tool.

The issue has been fixed in version 2.3.1.6.


How can this vulnerability impact me? :

This vulnerability can lead to a heap-buffer-overflow, which may cause the affected application to crash or behave unpredictably when processing malicious ICC profiles. Although the CVSS score indicates no impact on confidentiality or integrity, it has a high impact on availability, meaning it could cause denial of service by crashing the software.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by running the iccDumpProfile tool on ICC profiles to check for out-of-bounds heap reads. Specifically, under AddressSanitizer, running iccDumpProfile on a crafted malicious ICC profile triggers a heap-buffer-overflow in the CIccMpeSpectralMatrix::Describe() function.

A suggested command to detect the issue is to use AddressSanitizer with iccDumpProfile on suspicious ICC profiles to observe any heap-buffer-overflow errors.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade iccDEV to version 2.3.1.6 or later, where this heap-buffer-overflow vulnerability has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart