Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48175: CWE-190 Integer Overflow or Wraparound in aomedia libavif

0
Medium
VulnerabilityCVE-2025-48175cvecve-2025-48175cwe-190
Published: Fri May 16 2025 (05/16/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: aomedia
Product: libavif

Description

In libavif before 1.3.0, avifImageRGBToYUV in reformat.c has integer overflows in multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:28:44 UTC

Technical Analysis

CVE-2025-48175 identifies an integer overflow vulnerability in the libavif library, a widely used open-source implementation for encoding and decoding AVIF image format. The vulnerability exists in the avifImageRGBToYUV function within reformat.c, where integer multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes can overflow. These variables represent the byte sizes of image rows in RGB and YUV color spaces. An integer overflow here can cause incorrect memory allocation or buffer size calculations, leading to potential buffer overflows or memory corruption. This can compromise the integrity and availability of applications processing AVIF images. The CVSS 3.1 score of 4.5 reflects a medium severity with local attack vector, high attack complexity, no privileges required, no user interaction, and a scope change indicating impact beyond the vulnerable component. No known public exploits or patches are currently available, indicating the vulnerability is newly disclosed. The flaw primarily threatens applications that decode or reformat AVIF images using vulnerable libavif versions prior to 1.3.0. Attackers with local access could craft malicious AVIF images to trigger the overflow, potentially causing crashes or arbitrary code execution depending on the application context. Given the widespread adoption of AVIF in web browsers, media players, and image processing tools, this vulnerability could have broad implications once exploited.

Potential Impact

For European organizations, the vulnerability poses risks primarily to software and services that incorporate libavif for AVIF image processing, including web browsers, content management systems, media editing tools, and image viewers. Exploitation could lead to denial of service or integrity violations through memory corruption, potentially disrupting business operations or compromising data integrity. Industries such as digital media, publishing, advertising, and software development are particularly at risk. Since exploitation requires local access and has high complexity, remote attacks are less likely without additional vulnerabilities. However, supply chain risks exist if malicious AVIF images are processed automatically in enterprise environments. The impact on confidentiality is minimal, but integrity and availability could be affected. Organizations relying on open-source multimedia libraries should prioritize vulnerability assessments and patch management to prevent exploitation. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Monitor official libavif repositories and vendor advisories for the release of version 1.3.0 or later that addresses this vulnerability. 2. Plan and execute timely updates to libavif in all affected software and systems once patches are available. 3. Conduct code audits and testing of image processing components to detect unsafe handling of AVIF images, focusing on input validation and memory management. 4. Implement strict input validation and sandboxing for image processing workflows to limit the impact of malformed AVIF files. 5. Restrict local access to systems processing AVIF images to trusted users and environments to reduce attack surface. 6. Employ runtime protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation impact. 7. Educate developers and system administrators about the risks associated with integer overflows and secure coding practices in multimedia processing. 8. Review and update incident response plans to include scenarios involving image processing vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebed8

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 11/4/2025, 1:28:44 AM

Last updated: 11/20/2025, 6:03:50 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats