Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From versions 3.0.0 to before 3.2.9, 3.3.0 to before 3.3.11, and 3.4.0 to before 3.4.11, readVariableLengthInteger() decodes a variable-length integer from untrusted EXR input without bounding the shift count. After enough continuation bytes, the code executes a left shift by 70 on a 64-bit value, which is undefined behavior. This issue has been patched in versions 3.2.9, 3.3.11, and 3.4.11.
Published: 2026-05-07
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenEXR’s readVariableLengthInteger() decodes an untrusted EXR file without bounding the shift count. After processing multiple continuation bytes, the code performs a left shift by 70 on a 64‑bit value, a shift count that is larger than the width of the operand and triggers undefined behavior. Depending on how the runtime handles this UB, the application may crash, corrupt data in memory, or exhibit unpredictable behavior, potentially compromising confidentiality, integrity, or availability of the process reading the file.

Affected Systems

The vulnerability exists in the Academy Software Foundation’s OpenEXR library in versions 3.0.0 through 3.2.8, 3.3.0 through 3.3.10, and 3.4.0 through 3.4.10. The issue was addressed in 3.2.9, 3.3.11, and 3.4.11, which contain the necessary bounds checks for the shift operation.

Risk and Exploitability

The CVSS score of 6.3 indicates a medium to high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, which suggests a lower likelihood of widespread exploitation at present. However, the flaw can be triggered whenever an application loads an EXR file from an untrusted source, making it potentially exploitable in contexts where such files are accepted. Attackers would need to craft a malicious EXR file that forces the shift overflow; the impact could be a crash or memory corruption rather than immediate code execution.

Generated by OpenCVE AI on May 7, 2026 at 05:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEXR to version 3.2.9 or newer (3.3.11 or 3.4.11) to apply the fix that bounds the shift count
  • If an upgrade is temporarily unavailable, restrict or validate all EXR files to avoid processing untrusted files from external sources
  • Monitor the application for signs of crashes or memory corruption that could indicate an attempt to trigger the undefined behavior

Generated by OpenCVE AI on May 7, 2026 at 05:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From versions 3.0.0 to before 3.2.9, 3.3.0 to before 3.3.11, and 3.4.0 to before 3.4.11, readVariableLengthInteger() decodes a variable-length integer from untrusted EXR input without bounding the shift count. After enough continuation bytes, the code executes a left shift by 70 on a 64-bit value, which is undefined behavior. This issue has been patched in versions 3.2.9, 3.3.11, and 3.4.11.
Title OpenEXR: Shift exponent overflow in `readVariableLengthInteger()` (`ImfIDManifest.cpp`)
Weaknesses CWE-190
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T12:08:50.166Z

Reserved: 2026-04-25T05:04:37.028Z

Link: CVE-2026-42217

cve-icon Vulnrichment

Updated: 2026-05-07T12:08:45.971Z

cve-icon NVD

Status : Received

Published: 2026-05-07T04:16:34.387

Modified: 2026-05-07T04:16:34.387

Link: CVE-2026-42217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T05:45:06Z

Weaknesses