Impact
An integer overflow in the deflate_dng_load_raw function of LibRaw allows a malicious DNG file to corrupt a heap buffer, which can be leveraged for arbitrary code execution. The flaw is classified as CWE‑190, Integer Overflow or Wraparound, and leads to a heap buffer overflow that compromises confidentiality, integrity, and availability of the host process.
Affected Systems
LibRaw version 0.22.1 is affected. Applications that link against this release, such as image editors or viewers that process DNG files, are at risk. The vulnerability is limited to this exact version; newer releases are unaffected.
Risk and Exploitability
The CVSS score of 8.1 indicates a high severity vulnerability. EPSS is under 1 %, so the likelihood of exploitation is currently low, and the flaw is not documented in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires feeding a specially crafted DNG file to a program that invokes LibRaw; depending on the target, this can happen via local file upload, remote file transfer, or automatic download, making the attack vector potentially remote if the application accepts untrusted files over a network.
OpenCVE Enrichment