Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, heap-buffer-overflow read occurs during CIccTagTextDescription::Release() when strlen() reads past a heap buffer while parsing ICC profile XML text description tags, causing a crash. Commit 29d088840b962a7cdd35993dfabc2cb35a049847 fixes the issue. No known workarounds are available.
Published: 2026-02-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Heap Buffer Overflow Read
Action: Patch
AI Analysis

Impact

A heap‑buffer‑overflow read occurs in the CIccTagTextDescription::Release() routine of iccDEV when strlen() traverses past the bounds of a heap buffer while parsing ICC profile XML text description tags. The flaw causes a crash but does not expose confidential data or modify system integrity. The result is a denial of service that disrupts any process that attempts to load or validate an attacker‑crafted ICC profile.

Affected Systems

International Color Consortium iccDEV versions up to and including 2.3.1.4 are affected. Versions that incorporate the fix introduced in commit 29d088840b962a7cdd35993dfabc2cb35a049847 are not impacted.

Risk and Exploitability

The CVSS score of 7.1 and a very low EPSS score (<1%) indicate a moderate to high severity but a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to require an attacker‑controlled ICC profile, which could be supplied locally or from a remote source if the application accepts external profiles. Exploitation would result only in a crash and not in arbitrary code execution or data disclosure.

Generated by OpenCVE AI on April 17, 2026 at 15:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch included in commit 29d088840b962a7cdd35993dfabc2cb35a049847 to update iccDEV.
  • Rebuild any applications or libraries that link against iccDEV against the patched version to ensure the runtime uses the fixed code.
  • Restrict the use of ICC profiles to trusted sources and disable or sanitize XML text description tags until the library is upgraded.

Generated by OpenCVE AI on April 17, 2026 at 15:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, heap-buffer-overflow read occurs during CIccTagTextDescription::Release() when strlen() reads past a heap buffer while parsing ICC profile XML text description tags, causing a crash. Commit 29d088840b962a7cdd35993dfabc2cb35a049847 fixes the issue. No known workarounds are available.
Title iccDEV has HBO in CIccTagTextDescription::Release()
Weaknesses CWE-125
CWE-170
CWE-787
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T20:42:56.820Z

Reserved: 2026-02-23T17:56:51.202Z

Link: CVE-2026-27692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T15:20:52.727

Modified: 2026-02-26T15:43:56.077

Link: CVE-2026-27692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses