CVE-2026-42144
MEDIUMCImg Library: Integer overflow in PNM size check bypasses memory guard (_load_pnm)
Title source: cnaDescription
CImg Library is a C++ library for image processing. Prior to commit 4ca26bc, there is an integer overflow vulnerability in the W*H*D size computation inside _load_pnm() that can bypass the memory allocation guard. A crafted PNM/PGM/PPM file with large dimension values causes the overflow to wrap around, allocating an undersized buffer and potentially triggering a heap buffer overflow. Any application using CImg to load untrusted image files is affected. This issue has been patched via commit 4ca26bc.
References (4)
Core 4
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/GreycLab/CImg/security/advisories/GHSA-4663-63fm-44gc
X_Refsource_Misc x_refsource_misc
https://github.com/GreycLab/CImg/issues/478
X_Refsource_Misc x_refsource_misc
https://github.com/GreycLab/CImg/commit/4ca26bce4d8c61fcd1507d5f9401b9fb1222c27d
X_Refsource_Misc x_refsource_misc
https://github.com/GreycLab/CImg/releases/tag/v.3.7.5
Scores
CVSS v3
6.1
EPSS
0.0001
EPSS Percentile
1.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-190
Status
published
Products (1)
GreycLab/CImg
< 4ca26bce4d8c61fcd1507d5f9401b9fb1222c27d
Published
May 04, 2026
Tracked Since
May 05, 2026