Skip to main content

CVE-2025-48074: CWE-770: Allocation of Resources Without Limits or Throttling in AcademySoftwareFoundation openexr

Medium
VulnerabilityCVE-2025-48074cvecve-2025-48074cwe-770
Published: Fri Aug 01 2025 (08/01/2025, 16:32:54 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, applications trust unvalidated dataWindow size values from file headers, which can lead to excessive memory allocation and performance degradation when processing malicious files. This is fixed in version 3.3.3.

AI-Powered Analysis

AILast updated: 08/01/2025, 17:03:15 UTC

Technical Analysis

CVE-2025-48074 is a medium-severity vulnerability affecting the OpenEXR library maintained by the Academy Software Foundation. OpenEXR is a widely used image file format and reference implementation primarily utilized in the motion picture industry for high dynamic range imaging. The vulnerability exists in versions 3.3.2 up to but not including 3.3.3, where the software trusts unvalidated dataWindow size values found in the headers of EXR files. This lack of validation can lead to excessive memory allocation when processing maliciously crafted EXR files. Specifically, the vulnerability is categorized under CWE-770, which refers to allocation of resources without limits or throttling. An attacker can exploit this by supplying a file with an abnormally large or malformed dataWindow size, causing the application to allocate excessive memory, potentially leading to performance degradation or denial of service (DoS) due to resource exhaustion. The CVSS 4.0 base score is 4.6, indicating a medium severity level. The attack vector is local (AV:L), requiring local access, with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:A). The vulnerability does not impact confidentiality, integrity, or availability directly but can degrade availability through resource exhaustion. No known exploits are reported in the wild as of the publication date. The issue is fixed in version 3.3.3 by implementing proper validation and limits on the dataWindow size values during file processing. This vulnerability is particularly relevant for applications that automatically process or render EXR files, especially in automated pipelines or user-upload scenarios where malicious files could be introduced.

Potential Impact

For European organizations, especially those in the media, film production, visual effects, and animation sectors, this vulnerability poses a risk of service disruption. Organizations relying on OpenEXR for image processing in automated workflows could experience performance degradation or denial of service if maliciously crafted EXR files are processed. This could interrupt production pipelines, delay project timelines, and increase operational costs. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can affect business continuity. Additionally, organizations that accept EXR files from external sources or users (e.g., collaborative projects, cloud-based rendering services) are at higher risk. Given the specialized use of OpenEXR, the impact is more pronounced in companies with heavy reliance on this format and automated processing tools. The lack of known exploits reduces immediate risk, but the presence of a fix in version 3.3.3 necessitates timely patching to prevent future exploitation.

Mitigation Recommendations

European organizations should promptly update OpenEXR to version 3.3.3 or later to address this vulnerability. For environments where immediate patching is not feasible, implement strict validation and sanitization of EXR files before processing, including limiting the size and dimensions of dataWindow parameters. Employ resource monitoring and limits on memory usage for processes handling EXR files to detect and mitigate abnormal resource consumption. Restrict the acceptance of EXR files to trusted sources and implement user authentication and authorization controls to reduce exposure to malicious files. Incorporate file scanning and sandboxing techniques to analyze EXR files in isolated environments prior to integration into production workflows. Additionally, maintain comprehensive logging and alerting on resource usage anomalies to enable rapid response. Finally, educate development and operations teams about this vulnerability and ensure secure coding practices when handling image file inputs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-15T16:06:40.942Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688cefb0ad5a09ad00ca6abe

Added to database: 8/1/2025, 4:47:44 PM

Last enriched: 8/1/2025, 5:03:15 PM

Last updated: 8/31/2025, 4:46:11 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats