CVE-2025-48072

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48072
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48072.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48072
Aliases
Downstream
Published
2025-07-31T21:15:28Z
Modified
2025-08-14T13:00:56.790924Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. Version 3.3.2 is vulnerable to a heap-based buffer overflow during a read operation due to bad pointer math when decompressing DWAA-packed scan-line EXR files with a maliciously forged chunk. This is fixed in version 3.3.3.

References

Affected packages

Git / github.com/academysoftwarefoundation/openexr

Affected ranges

Type
GIT
Repo
https://github.com/academysoftwarefoundation/openexr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/openexr/openexr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

OPENEXR_1_0_4

v1.*

v1.7.1

v2.*

v2.0.0
v2.0.0.GM
v2.0.0.beta.1
v2.0.0.beta.2
v2.0.1
v2.1.0
v2.2.0
v2.3.0
v2.4.0
v2.4.0-beta.1
v2.5.0

v3.*

v3.0.0-beta
v3.2.0-rc
v3.3.0
v3.3.0-rc
v3.3.0-rc1
v3.3.0-rc2
v3.3.1
v3.3.1-rc
v3.3.2
v3.3.2-rc
v3.3.2-rc2
v3.3.2-rc3
v3.3.2-rc4