OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3.
History

Wed, 13 Aug 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 04 Aug 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Openexr
Openexr openexr
Vendors & Products Openexr
Openexr openexr

Fri, 01 Aug 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}

threat_severity

Important


Thu, 31 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
Description OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3.
Title OpenEXR's Forged Unpacked Size can Lead to Heap-Based Buffer Overflow in Deep Scanline Parsing
Weaknesses CWE-122
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-31T20:13:14.436Z

Updated: 2025-07-31T20:22:23.603Z

Reserved: 2025-05-15T16:06:40.941Z

Link: CVE-2025-48071

cve-icon Vulnrichment

Updated: 2025-07-31T20:22:15.301Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-31T21:15:27.990

Modified: 2025-08-13T19:18:51.740

Link: CVE-2025-48071

cve-icon Redhat

Severity : Important

Publid Date: 2025-07-31T20:13:14Z

Links: CVE-2025-48071 - Bugzilla