Description
Buffer Overflow vulnerability in OpenImageIO v.2.4.12.0 and before allows a remote to execute arbitrary code and obtain sensitive information via a crafted file to the readimg function.
References (4)
Core 4
Core References
Exploit, Issue Tracking, Vendor Advisory
https://github.com/OpenImageIO/oiio/issues/3871
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/08/msg00005.html
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYFTS5LK725R6KVIYJVTPN3A6B6C7E6D/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPHVMLS2LYMLURWFL7CMZ3Y7UMW3M4AW/
Scores
CVSS v3
7.8
EPSS
0.0011
EPSS Percentile
28.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (1)
openimageio/openimageio
< 2.4.12.0
Published
Jul 03, 2023
Tracked Since
Feb 18, 2026