Impact
A buffer overflow is triggered when processing DDS image files via the ddsinput.cpp component of OpenImageIO. The write occurs beyond the bounds of the target array, potentially corrupting memory and leading to program instability or abnormal behavior. The vulnerability is categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Buffer) and CWE-787 (Out-of-Bounds Write). The CVSS score of 4.8 indicates a low severity impact.
Affected Systems
The flaw exists in AcademySoftwareFoundation OpenImageIO versions up to 3.2.0.1-dev. Any installation that parses DDS image files using the DDS Image Handler in this dataset range is affected; newer releases are not included in the advisory.
Risk and Exploitability
The exploit requires local execution and is currently available in the public domain. No EPSS score has been published, and the vulnerability is not listed in the CISA KEV catalog, reflecting a low public exploit probability. Because the attack is local, the risk is confined to systems where a privileged or unprivileged local user can provide malicious DDS files to the OpenImageIO library.
OpenCVE Enrichment