CVE-2025-48071Heap-based Buffer Overflow in Openexr

Severity
8.4HIGHNVD
EPSS
0.0%
top 89.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 31

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

NVDopenexr/openexr3.3.03.3.3
PyPIopenexr/openexr3.3.03.3.3
CVEListV5academysoftwarefoundation/openexr>= 3.3.0, < 3.3.3

Patches

🔴Vulnerability Details

3
OSV
OpenEXR Heap-Based Buffer Overflow in Deep Scanline Parsing via Forged Unpacked Size2025-07-31
GHSA
OpenEXR Heap-Based Buffer Overflow in Deep Scanline Parsing via Forged Unpacked Size2025-07-31
OSV
CVE-2025-48071: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry2025-07-31

📋Vendor Advisories

2
Red Hat
openexr: OpenEXR Heap-Based Buffer Overflow2025-07-31
Debian
CVE-2025-48071: openexr - OpenEXR provides the specification and reference implementation of the EXR file ...2025
CVE-2025-48071 — Heap-based Buffer Overflow in Openexr | cvebase