Impact
A vulnerability was discovered in libheif versions up to 1.21.2 that allows a local attacker to supply a specially crafted HEIF file that triggers an out-of-bounds read in the Track::load function of libheif/sequences/track.cc. The exploitation can expose memory contents or cause a crash, which may lead to information disclosure. The weakness corresponds to CWE-119 and CWE-125.
Affected Systems
The affected product is strukturag:libheif up to version 1.21.2. The bug resides in the stsz/stts track loader of the library, and any installation of libheif in this version range is vulnerable.
Risk and Exploitability
The CVSS score is 4.8, indicating a low‑severity risk, and the EPSS score is less than 1%, showing a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog and requires local access, which limits the threat surface. Exploit code is publicly available on GitHub and may be used by local adversaries, but no known widespread incidents have been reported. The primary concern is potential information disclosure from the out‑of‑bounds read.
OpenCVE Enrichment