Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a stack-buffer-overflow (SBO) in CIccCalculatorFunc::Apply() when processed via iccApplyNamedCmm. Under AddressSanitizer, the failure is reported as a 4-byte write stack-buffer-overflow in IccProfLib/IccMpeCalc.cpp:3873, reachable through the MPE calculator / curve set initialization path. This issue has been patched in version 2.3.1.6.
Published: 2026-03-31
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stack Buffer Overflow that may enable code execution
Action: Immediate Patch
AI Analysis

Impact

A crafted ICC color profile can trigger a stack‑buffer‑overflow in the CIccCalculatorFunc::Apply() routine of iccDEV. The overflow occurs when the profile is processed via iccApplyNamedCmm, allowing a 4‑byte write that can corrupt control data on the stack. If an attacker succeeds, they could execute arbitrary code or cause a denial‑of‑service by corrupting the execution flow of the process that loads the profile.

Affected Systems

The InternationalColorConsortium ilcDEV library and tools are affected. All releases preceding v2.3.1.6 are vulnerable; the issue was fixed in v2.3.1.6. Users running earlier versions on any platform that processes ICC profiles are potentially at risk.

Risk and Exploitability

The CVSS score of 6.2 indicates moderate severity. No EPSS score is listed, and the vulnerability is not in the CISA KEV catalog, suggesting limited or no publicly available exploits currently. The likely attack vector involves a malicious or malformed ICC profile being processed by an application that depends on iccDEV. If the profile is loaded in a privileged context, the compromised stack could lead to elevation of privileges or remote code execution.

Generated by OpenCVE AI on April 1, 2026 at 05:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade iccDEV to version 2.3.1.6 or later.
  • If upgrading is not immediately possible, prevent the processing of untrusted ICC profiles or isolate such processing in a sandboxed environment.
  • Monitor system logs for anomalous crashes or unusual profile activity and apply additional security controls to protect the application using iccDEV.

Generated by OpenCVE AI on April 1, 2026 at 05:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a stack-buffer-overflow (SBO) in CIccCalculatorFunc::Apply() when processed via iccApplyNamedCmm. Under AddressSanitizer, the failure is reported as a 4-byte write stack-buffer-overflow in IccProfLib/IccMpeCalc.cpp:3873, reachable through the MPE calculator / curve set initialization path. This issue has been patched in version 2.3.1.6.
Title iccDEV: SBO in CIccCalculatorFunc::Apply()
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:41:12.677Z

Reserved: 2026-03-30T16:31:39.263Z

Link: CVE-2026-34542

cve-icon Vulnrichment

Updated: 2026-04-03T16:41:08.857Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-31T22:16:21.920

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-34542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:12Z

Weaknesses