Impact
A flaw in the icAnsiToUtf8() routine of the iccDEV library causes the function to interpret an input buffer as a C‑string and invoke strlen on it. The buffer is only 114 bytes long, yet the read extends 115 bytes beyond its allocation, leading to an out‑of‑bounds read. This heap buffer overflow can corrupt memory, potentially causing a program crash or unpredictable behavior, but the CVE description does not indicate that code execution can be achieved.
Affected Systems
All releases of International Color Consortium’s iccDEV library and associated tools prior to version 2.3.1.6 are affected, including the iccToXml tool. The bug was fixed in version 2.3.1.6 and later releases.
Risk and Exploitability
The CVSS score of 6.2 reflects a moderate severity. EPSS data is not provided, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local or user‑controlled: a malicious ICC profile processed by iccDEV triggers the overflow. No remote exploitation or privilege escalation is described in the CVE data.
OpenCVE Enrichment