Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap out-of-bounds read in CIccPcsXform::pushXYZConvert() causing crash and potentially leaking memory contents. This vulnerability is fixed in 2.3.1.5.
Published: 2026-03-10
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Disclosure
Action: Patch Now
AI Analysis

Impact

The vulnerability arises from a heap out-of-bounds read in the CIccPcsXform::pushXYZConvert() function of the iccDEV library. This flaw allows an attacker to read data beyond the intended buffer, potentially exposing sensitive memory contents and, if triggered, causing an application crash. The weakness is reflected in CWE-122, CWE-125, and CWE-129, indicating improper handling of heap memory, out-of-bounds read, and signed‑to‑unsigned conversion. The result is a compromise of confidentiality and service availability.

Affected Systems

Affected products belong to the InternationalColorConsortium's iccDEV suite. Versions prior to 2.3.1.5 are vulnerable. Any deployment using iccDEV on a platform that processes ICC profiles is potentially at risk. The vulnerability is not limited to a specific operating system; it exists in the cross‑platform C++ library itself.

Risk and Exploitability

The CVSS base score is 6.1, indicating a medium severity. An EPSS score below 1% implies a low likelihood of widespread exploitation. The vulnerability does not appear in the CISA KEV list, meaning there are no known active exploits exploiting it. The attack vector is not explicitly stated in the advisory; based on the description, it is inferred that an attacker could supply a crafted ICC profile to a process that uses iccDEV, causing the out‑of‑bounds read and potential memory disclosure or crash. Therefore, while the probability of exploitation is low, any system that handles external ICC data should consider the risk when evaluating overall threat posture.

Generated by OpenCVE AI on April 16, 2026 at 03:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the iccDEV library to version 2.3.1.5 or later, which contains the fix for the out‑of‑bounds read.
  • If an upgrade is not immediately feasible, discontinue processing of untrusted ICC profiles until a patch can be applied.
  • During development, enable runtime memory sanitization such as AddressSanitizer to detect similar issues before release.

Generated by OpenCVE AI on April 16, 2026 at 03:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Tue, 10 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap out-of-bounds read in CIccPcsXform::pushXYZConvert() causing crash and potentially leaking memory contents. This vulnerability is fixed in 2.3.1.5.
Title iccDEV has a heap out-of-bounds read in CIccPcsXform::pushXYZConvert()
Weaknesses CWE-122
CWE-125
CWE-129
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T19:32:27.624Z

Reserved: 2026-03-07T17:53:48.817Z

Link: CVE-2026-30982

cve-icon Vulnrichment

Updated: 2026-03-10T19:28:01.788Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:57.180

Modified: 2026-03-13T20:28:43.110

Link: CVE-2026-30982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:45:16Z

Weaknesses