CVE-2026-34534
Heap Buffer Overflow in iccDEV ICC Profile Parsing (Pre
Publication date: 2026-03-31
Last updated on: 2026-04-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| color | iccdev | to 2.3.1.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in iccDEV, a set of libraries and tools for working with ICC color management profiles. Before version 2.3.1.6, a specially crafted ICC profile could cause a heap-buffer-overflow (HBO) in the function CIccMpeSpectralMatrix::Describe(). This means that when processing a malicious ICC profile, the software might read memory outside the allocated heap buffer, which is detected as an out-of-bounds heap read by AddressSanitizer when running the iccDumpProfile tool.
The issue has been fixed in version 2.3.1.6.
How can this vulnerability impact me? :
This vulnerability can lead to a heap-buffer-overflow, which may cause the affected application to crash or behave unpredictably when processing malicious ICC profiles. Although the CVSS score indicates no impact on confidentiality or integrity, it has a high impact on availability, meaning it could cause denial of service by crashing the software.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the iccDumpProfile tool on ICC profiles to check for out-of-bounds heap reads. Specifically, under AddressSanitizer, running iccDumpProfile on a crafted malicious ICC profile triggers a heap-buffer-overflow in the CIccMpeSpectralMatrix::Describe() function.
A suggested command to detect the issue is to use AddressSanitizer with iccDumpProfile on suspicious ICC profiles to observe any heap-buffer-overflow errors.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade iccDEV to version 2.3.1.6 or later, where this heap-buffer-overflow vulnerability has been patched.