Impact
An error condition in libheif 1.21.2 and earlier causes a corrupted HEIF grid tile to silently fail to decode while the library reports success, leaving uninitialized heap data in the Y, Cb, and Cr planes. The resulting decoded image contains 4,096 bytes per plane, totaling over 12 KB of memory that may hold prior user data such as authentication tokens or database results. Because the error is not reported to the caller, applications receive a normal success code and cannot sense that the image is corrupted. This behavior aligns with CWE-200 (Information Exposure) and CWE-908 (Information Leak through Uninitialized Data).
Affected Systems
All users of strukturag:libheif running version 1.21.2 or earlier are affected. The fix was applied in version 1.22.0 and subsequent releases, so any deployment that has not yet upgraded is vulnerable.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog. The primary attack scenario involves an attacker crafting a malicious HEIC or AVIF file and providing it to an application that decodes images, such as a server‑side image processor or thumbnail generator. Because the bug triggers on corrupted grid tiles and does not require elevated privileges, any process that links against libheif can potentially leak sensitive heap contents. In environments where images are generated from untrusted uploads, the risk to confidentiality is moderate to high, depending on the sensitivity of the data previously residing in the heap.
OpenCVE Enrichment