Impact
A crafted ICC profile can trigger a heap‑buffer‑overflow (HBO) when the CIccMpeSpectralMatrix::Describe() routine is invoked. The overflow manifests as an out‑of‑bounds heap read that can be detected with AddressSanitizer. The vulnerability is limited to the memory handling of the profile data and does not directly lead to code execution, but it can corrupt program state or lead to denial of service if an attacker controls the profile. The weakness is identified as an improper handling of untrusted input (CWE‑122).
Affected Systems
The vulnerability affects the InternationalColorConsortium iccDEV libraries and tools. Any deployment of iccDEV prior to version 2.3.1.6 is susceptible. The issue was fixed in release 2.3.1.6, so systems running newer versions are not impacted.
Risk and Exploitability
The CVSS score is 6.2, indicating moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. There is no publicly known exploit, but the lack of an EPSS score and absence from KEV suggest current risk is uncertain. Attackers would need to supply a malicious ICC profile to the iccDumpProfile tool or any application that processes ICC profiles via the vulnerable routine. Because the overflow is an out‑of‑bounds read, exploitation would require additional control logic to cause a denial of service or memory corruption.
OpenCVE Enrichment