Impact
OpenEXR's internal DWA decoder performs a 32‑bit integer multiplication that is not cast to a larger type, leading to a potential integer overflow when calculating channel size. This can corrupt memory via outBufferEnd pointer arithmetic. The vulnerability is categorized as CWE‑190.
Affected Systems
The vulnerability affects the open-source Academy Software Foundation OpenEXR library. Vulnerable releases include 3.2.0 through 3.2.7, 3.3.0 through 3.3.9, and 3.4.0 through 3.4.9. Versions 3.2.8, 3.3.10, and 3.4.10 contain the fix that properly casts the operands before the multiplication.
Risk and Exploitability
The CVSS score of 8.4 indicates high severity. The EPSS score is below 1%, indicating a low current exploitation probability. The CVE description does not provide details on how the overflow might be triggered or the precise impact, so information on exploitation methods is not available. The flaw is not listed in CISA's KEV catalog.
OpenCVE Enrichment