CVE-2026-34536
Stack Overflow in iccDEV ICC Profile Processing Causes Crash
Publication date: 2026-03-31
Last updated on: 2026-04-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| color | iccdev | to 2.3.1.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can cause a stack overflow resulting in a crash of the application using the iccDEV libraries when processing a malicious ICC profile. According to the CVSS score, the impact is on availability (A:H), meaning it can cause denial of service by crashing the application. There is no impact on confidentiality or integrity.
Can you explain this vulnerability to me?
This vulnerability exists in iccDEV, a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a specially crafted ICC profile can cause a stack overflow in the function SIccCalcOp::ArgsUsed(). This happens when the iccApplyProfiles function processes a malicious profile, leading to a crash during the calculation of argument usage related to underflow or overflow checks in the calculator.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing crashes or stack overflow errors when processing ICC profiles with vulnerable versions of iccDEV prior to 2.3.1.6. Specifically, running iccApplyProfiles on a crafted malicious ICC profile under AddressSanitizer can reveal a stack overflow in SIccCalcOp::ArgsUsed().
There are no specific commands provided to detect this vulnerability on your system or network.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade iccDEV to version 2.3.1.6 or later, where the stack overflow issue has been patched.