Description
A code execution vulnerability exists in the DDS scanline parsing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially-crafted .dds can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References (3)
Core 3
Core References
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634
Third Party Advisory
https://www.debian.org/security/2023/dsa-5384
Third Party Advisory
https://security.gentoo.org/glsa/202305-33
Scores
CVSS v3
9.8
EPSS
0.0105
EPSS Percentile
77.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (2)
debian/debian_linux
11.0
openimageio/openimageio
2.4.4.2
Published
Dec 22, 2022
Tracked Since
Feb 18, 2026