Impact
A heap‑buffer‑overflow read occurs in the CIccTagTextDescription::Release() routine of iccDEV when strlen() traverses past the bounds of a heap buffer while parsing ICC profile XML text description tags. The flaw causes a crash but does not expose confidential data or modify system integrity. The result is a denial of service that disrupts any process that attempts to load or validate an attacker‑crafted ICC profile.
Affected Systems
International Color Consortium iccDEV versions up to and including 2.3.1.4 are affected. Versions that incorporate the fix introduced in commit 29d088840b962a7cdd35993dfabc2cb35a049847 are not impacted.
Risk and Exploitability
The CVSS score of 7.1 and a very low EPSS score (<1%) indicate a moderate to high severity but a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to require an attacker‑controlled ICC profile, which could be supplied locally or from a remote source if the application accepts external profiles. Exploitation would result only in a crash and not in arbitrary code execution or data disclosure.
OpenCVE Enrichment