CVE-2026-34555
Received Received - Intake
Stack Buffer Overflow in iccDEV Color Management Library

Publication date: 2026-03-31

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
color iccdev to 2.3.1.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-buffer-overflow (SBO) found in the iccDEV libraries and tools used for ICC color management profiles. Specifically, it occurs in the function CIccTagFixedNum::GetValues() and involves a write operation that overflows a 4-byte stack variable. The overflow happens through a call chain involving CIccTagFixedNum::GetValues() and CIccTagStruct::GetElemNumberValue(). This flaw can cause a program crash or other unintended behavior. The issue was fixed in version 2.3.1.6 of iccDEV.


How can this vulnerability impact me? :

The vulnerability can lead to a crash of the affected software due to a stack-buffer-overflow. According to the CVSS score, it has a high impact on availability (A:H), meaning it can cause denial of service by crashing the application. However, it does not impact confidentiality or integrity. The attack requires local access with low privileges and no user interaction.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been patched in iccDEV version 2.3.1.6. To mitigate this vulnerability, you should upgrade your iccDEV libraries and tools to version 2.3.1.6 or later.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-34555 is a stack-based buffer overflow vulnerability in the iccDEV library that can lead to denial-of-service (DoS) conditions or potentially arbitrary code execution when processing crafted ICC profiles.

The vulnerability impacts availability by causing crashes or memory corruption but does not affect confidentiality or integrity of data, as indicated by the CVSS metrics (Confidentiality: None, Integrity: None, Availability: High).

Because the vulnerability does not involve unauthorized access to or disclosure of personal or sensitive data, it does not directly implicate compliance with data protection regulations such as GDPR or HIPAA.

However, organizations relying on iccDEV for color profile processing should consider the availability impact, as denial-of-service could disrupt services or workflows, which might indirectly affect operational compliance requirements.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by running fuzz testing tools such as libFuzzer or AFL++ with AddressSanitizer (ASan) and UndefinedBehaviorSanitizer (UBSan) enabled to identify stack-buffer-overflow and undefined behavior issues when processing ICC profile files.

Specifically, the vulnerability was reproduced using crafted ICC profile files (e.g., sbo-GetValues-FixedNum-crafted-cenc.icc) with iccDEV tools like iccApplyToLink, iccApplyNamedCmm, and iccApplySearch.

To detect the vulnerability on your system, you can build the iccDEV project with sanitizers enabled and run the following example commands:

  • Build iccDEV with Clang and sanitizers enabled: clang++ -fsanitize=address,undefined -fno-omit-frame-pointer -g -O1 -fprofile-arcs -ftest-coverage
  • Run iccApplyToLink with the crafted ICC profile to trigger the stack-buffer-overflow: ./iccApplyToLink sbo-GetValues-FixedNum-crafted-cenc.icc
  • Run iccApplyNamedCmm with the crafted ICC profile and JSON configuration to detect undefined behavior: ./iccApplyNamedCmm -c config.json
  • Run iccApplySearch with a crafted ICC profile to detect type confusion and invalid pointer usage: ./iccApplySearch sbo-CIccTagStruct-GetElemNumberValue-IccTagComposite_cpp-Line737.icc

These commands, when run with sanitizers enabled, will produce runtime errors or sanitizer reports indicating the presence of the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart