Description
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`
References (3)
Core 3
Core References
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
Third Party Advisory
https://www.debian.org/security/2023/dsa-5384
Third Party Advisory
https://security.gentoo.org/glsa/202305-33
Scores
CVSS v3
8.1
EPSS
0.0082
EPSS Percentile
74.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
Status
published
Products (2)
debian/debian_linux
11.0
openimageio/openimageio
2.4.4.2
Published
Dec 22, 2022
Tracked Since
Feb 18, 2026