CVE-2026-34536
Received Received - Intake
Stack Overflow in iccDEV ICC Profile Processing Causes Crash

Publication date: 2026-03-31

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a stack overflow (SO) in SIccCalcOp::ArgsUsed(). The issue is observable under AddressSanitizer as a stack-overflow when iccApplyProfiles processes a malicious profile, with the crash occurring while computing argument usage during calculator underflow/overflow checks. This issue has been patched in version 2.3.1.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
color iccdev to 2.3.1.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability can cause a stack overflow resulting in a crash of the application using the iccDEV libraries when processing a malicious ICC profile. According to the CVSS score, the impact is on availability (A:H), meaning it can cause denial of service by crashing the application. There is no impact on confidentiality or integrity.


Can you explain this vulnerability to me?

This vulnerability exists in iccDEV, a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a specially crafted ICC profile can cause a stack overflow in the function SIccCalcOp::ArgsUsed(). This happens when the iccApplyProfiles function processes a malicious profile, leading to a crash during the calculation of argument usage related to underflow or overflow checks in the calculator.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing crashes or stack overflow errors when processing ICC profiles with vulnerable versions of iccDEV prior to 2.3.1.6. Specifically, running iccApplyProfiles on a crafted malicious ICC profile under AddressSanitizer can reveal a stack overflow in SIccCalcOp::ArgsUsed().

There are no specific commands provided to detect this vulnerability on your system or network.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade iccDEV to version 2.3.1.6 or later, where the stack overflow issue has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart