Description
A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
Published: 2026-03-11
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-bounds read (potential information disclosure)
Action: Apply Patch
AI Analysis

Impact

A vulnerability was discovered in libheif versions up to 1.21.2 that allows a local attacker to supply a specially crafted HEIF file that triggers an out-of-bounds read in the Track::load function of libheif/sequences/track.cc. The exploitation can expose memory contents or cause a crash, which may lead to information disclosure. The weakness corresponds to CWE-119 and CWE-125.

Affected Systems

The affected product is strukturag:libheif up to version 1.21.2. The bug resides in the stsz/stts track loader of the library, and any installation of libheif in this version range is vulnerable.

Risk and Exploitability

The CVSS score is 4.8, indicating a low‑severity risk, and the EPSS score is less than 1%, showing a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog and requires local access, which limits the threat surface. Exploit code is publicly available on GitHub and may be used by local adversaries, but no known widespread incidents have been reported. The primary concern is potential information disclosure from the out‑of‑bounds read.

Generated by OpenCVE AI on March 17, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the available unofficial patch from libheif PR 1721 to fix the out-of-bounds read.
  • If patch cannot be applied immediately, restrict execution of libheif to trusted users only.
  • Monitor the libheif repository for an official patch and upgrade to a fixed version when released.

Generated by OpenCVE AI on March 17, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Struktur
Struktur libheif
Vendors & Products Struktur
Struktur libheif

Wed, 11 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
Title strukturag libheif stsz/stts track.cc load out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Struktur Libheif
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T20:24:59.822Z

Reserved: 2026-03-11T12:02:54.833Z

Link: CVE-2026-3950

cve-icon Vulnrichment

Updated: 2026-03-11T20:24:48.393Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T20:16:22.567

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-3950

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-11T19:02:08Z

Links: CVE-2026-3950 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:25Z

Weaknesses