Impact
A crafted ICC color profile can trigger a stack‑buffer‑overflow in the CIccCalculatorFunc::Apply() routine of iccDEV. The overflow occurs when the profile is processed via iccApplyNamedCmm, allowing a 4‑byte write that can corrupt control data on the stack. If an attacker succeeds, they could execute arbitrary code or cause a denial‑of‑service by corrupting the execution flow of the process that loads the profile.
Affected Systems
The InternationalColorConsortium ilcDEV library and tools are affected. All releases preceding v2.3.1.6 are vulnerable; the issue was fixed in v2.3.1.6. Users running earlier versions on any platform that processes ICC profiles are potentially at risk.
Risk and Exploitability
The CVSS score of 6.2 indicates moderate severity. No EPSS score is listed, and the vulnerability is not in the CISA KEV catalog, suggesting limited or no publicly available exploits currently. The likely attack vector involves a malicious or malformed ICC profile being processed by an application that depends on iccDEV. If the profile is loaded in a privileged context, the compromised stack could lead to elevation of privileges or remote code execution.
OpenCVE Enrichment