Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger Undefined Behavior (UB) in CIccCalculatorFunc::ApplySequence() due to invalid enum values being loaded for icChannelFuncSignature. The issue is observable under UBSan as a “load of value … not a valid value for type icChannelFuncSignature”, indicating a type/enum value confusion scenario during ICC profile processing. This issue has been patched in version 2.3.1.6.
Published: 2026-03-31
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Undefined behaviour that can destabilize ICC profile processing and potentially expose attacks
Action: Apply patch
AI Analysis

Impact

A vulnerability exists in the iccDEV library, wherein the function CIccCalculatorFunc::ApplySequence() can perform undefined behavior when processing an ICC profile that contains invalid enum values for icChannelFuncSignature. Because the library interprets these values incorrectly, the program may crash or behave unpredictably during color profile calculation. The underlying weakness is a type/enum value confusion, classified as CWE-758.

Affected Systems

This flaw affects the International Color Consortium’s iccDEV suite for all versions released before 2.3.1.6. A user who loads a malicious or malformed ICC profile—such as one that has been specially crafted to exploit the enum mishandling—would trigger the undefined behavior.

Risk and Exploitability

The CVSS base score is 6.2, indicating medium severity. No EPSS score is reported, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog, suggesting that widespread exploitation has not been observed. Attackers could potentially cause a denial‑of‑service or, if additional vulnerabilities exist, execute arbitrary code by feeding the affected software with a crafted ICC profile. The risk is primarily through any application that automatically consumes ICC profiles, so the attack vector is inferred to be local or remote file upload, depending on the context of the consuming software.

Generated by OpenCVE AI on April 1, 2026 at 06:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update iccDEV to version 2.3.1.6 or later
  • If an upgrade is not possible, restrict or filter ICC profiles that are loaded by the application
  • Use the vendor’s security advisories (GHSA‑8jj3‑77m7‑c3pq) to stay informed about the fix
  • Monitor for crash logs or UBSan warnings indicating the undefined behavior has been triggered

Generated by OpenCVE AI on April 1, 2026 at 06:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger Undefined Behavior (UB) in CIccCalculatorFunc::ApplySequence() due to invalid enum values being loaded for icChannelFuncSignature. The issue is observable under UBSan as a “load of value … not a valid value for type icChannelFuncSignature”, indicating a type/enum value confusion scenario during ICC profile processing. This issue has been patched in version 2.3.1.6.
Title iccDEV: UB in CIccCalculatorFunc::ApplySequence()
Weaknesses CWE-758
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:38:58.635Z

Reserved: 2026-03-30T16:03:31.048Z

Link: CVE-2026-34533

cve-icon Vulnrichment

Updated: 2026-04-03T16:38:54.263Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-31T22:16:20.637

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-34533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:20Z

Weaknesses