Impact
The CVE involves an integer overflow or wraparound in the rtengine modules of the artraweditor ART image‑processing suite, specifically within the source file dcraw.C. The overflow can corrupt the program’s memory when processing raw image data, potentially leading to unpredictable behavior or crashes. The weakness is identified as CWE‑190 and carries a high CVSS base score of 8.5, indicating significant impact on system integrity.
Affected Systems
All installations of artraweditor ART running a version earlier than 1.25.12 are vulnerable. The issue resides in modules that handle raw image input, so any instance that processes raw image files through ART, whether as a standalone tool or as part of a larger application, may be affected.
Risk and Exploitability
The CVSS score of 8.5 reflects a high severity, and the lack of EPSS data or KEV listing does not reduce the risk inherent in the vulnerability. It is inferred that an attacker could trigger the overflow by supplying a crafted raw image file during routine processing, though the CVE description does not explicitly confirm this attack vector. Organizations using ART should assume that the vulnerability could be leveraged to corrupt memory, disrupt availability, or create a foothold for further exploitation.
OpenCVE Enrichment