CVE-2025-48175: CWE-190 Integer Overflow or Wraparound in aomedia libavif
In libavif before 1.3.0, avifImageRGBToYUV in reformat.c has integer overflows in multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes.
AI Analysis
Technical Summary
CVE-2025-48175 is a medium-severity integer overflow vulnerability identified in the libavif library, specifically in versions prior to 1.3.0. Libavif is an open-source library used for encoding and decoding AVIF image files, which are based on the AV1 video codec and increasingly adopted for efficient image compression. The vulnerability exists in the function avifImageRGBToYUV within the reformat.c source file. This function performs color space conversion from RGB to YUV, involving calculations with row byte sizes for RGB, Y, U, and V components. The integer overflow occurs during multiplications involving these row byte variables (rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes). An integer overflow or wraparound can lead to incorrect memory allocation or buffer size calculations, potentially causing buffer overflows or memory corruption. This can result in denial of service or possibly code execution under certain conditions. The CVSS 3.1 base score is 4.5, reflecting a medium severity with the following vector: Attack Vector: Local (AV:L), Attack Complexity: High (AC:H), Privileges Required: None (PR:N), User Interaction: None (UI:N), Scope: Changed (S:C), Confidentiality: None (C:N), Integrity: Low (I:L), Availability: Low (A:L). The vulnerability requires local access and has a high complexity to exploit, with no user interaction needed and no privileges required. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable component. No known exploits are reported in the wild as of the publication date. No patches or fixes are linked yet, indicating that remediation may be pending or in progress. Given the nature of libavif as a widely used image processing library embedded in various applications and systems, this vulnerability could be leveraged in scenarios where untrusted AVIF images are processed locally, such as in image viewers, editors, or other multimedia software.
Potential Impact
For European organizations, the impact of CVE-2025-48175 depends on the extent of libavif usage within their software stack. Organizations relying on software that processes AVIF images locally—such as media companies, digital content providers, software developers, and enterprises using AVIF-supporting applications—may be at risk. Successful exploitation could lead to local denial of service or limited integrity compromise, potentially disrupting workflows or causing application crashes. Although remote exploitation is not indicated, insider threats or malicious files introduced via removable media or internal networks could trigger the vulnerability. The changed scope suggests that exploitation might affect other components or escalate impact beyond the immediate library. Given the increasing adoption of AVIF for web and media content in Europe, especially in industries emphasizing efficient image compression, this vulnerability could affect a broad range of endpoints. However, the requirement for local access and high attack complexity limits the likelihood of widespread exploitation. Still, targeted attacks against high-value systems processing AVIF images could leverage this flaw to disrupt services or corrupt data.
Mitigation Recommendations
European organizations should proactively identify all software and systems that incorporate libavif, particularly versions prior to 1.3.0. Since no official patches are linked yet, organizations should monitor vendor advisories and update to libavif 1.3.0 or later once available. In the interim, restrict local access to systems processing AVIF images to trusted users only, and implement strict file validation and sandboxing for AVIF image processing applications to limit potential damage from malformed files. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior related to image processing. Additionally, conduct code audits or use static analysis tools on in-house software that integrates libavif to identify and mitigate unsafe usage patterns. Network segmentation and strict control over removable media can reduce the risk of malicious AVIF files reaching vulnerable systems. Finally, raise user awareness about the risks of opening untrusted image files locally.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-48175: CWE-190 Integer Overflow or Wraparound in aomedia libavif
Description
In libavif before 1.3.0, avifImageRGBToYUV in reformat.c has integer overflows in multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes.
AI-Powered Analysis
Technical Analysis
CVE-2025-48175 is a medium-severity integer overflow vulnerability identified in the libavif library, specifically in versions prior to 1.3.0. Libavif is an open-source library used for encoding and decoding AVIF image files, which are based on the AV1 video codec and increasingly adopted for efficient image compression. The vulnerability exists in the function avifImageRGBToYUV within the reformat.c source file. This function performs color space conversion from RGB to YUV, involving calculations with row byte sizes for RGB, Y, U, and V components. The integer overflow occurs during multiplications involving these row byte variables (rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes). An integer overflow or wraparound can lead to incorrect memory allocation or buffer size calculations, potentially causing buffer overflows or memory corruption. This can result in denial of service or possibly code execution under certain conditions. The CVSS 3.1 base score is 4.5, reflecting a medium severity with the following vector: Attack Vector: Local (AV:L), Attack Complexity: High (AC:H), Privileges Required: None (PR:N), User Interaction: None (UI:N), Scope: Changed (S:C), Confidentiality: None (C:N), Integrity: Low (I:L), Availability: Low (A:L). The vulnerability requires local access and has a high complexity to exploit, with no user interaction needed and no privileges required. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable component. No known exploits are reported in the wild as of the publication date. No patches or fixes are linked yet, indicating that remediation may be pending or in progress. Given the nature of libavif as a widely used image processing library embedded in various applications and systems, this vulnerability could be leveraged in scenarios where untrusted AVIF images are processed locally, such as in image viewers, editors, or other multimedia software.
Potential Impact
For European organizations, the impact of CVE-2025-48175 depends on the extent of libavif usage within their software stack. Organizations relying on software that processes AVIF images locally—such as media companies, digital content providers, software developers, and enterprises using AVIF-supporting applications—may be at risk. Successful exploitation could lead to local denial of service or limited integrity compromise, potentially disrupting workflows or causing application crashes. Although remote exploitation is not indicated, insider threats or malicious files introduced via removable media or internal networks could trigger the vulnerability. The changed scope suggests that exploitation might affect other components or escalate impact beyond the immediate library. Given the increasing adoption of AVIF for web and media content in Europe, especially in industries emphasizing efficient image compression, this vulnerability could affect a broad range of endpoints. However, the requirement for local access and high attack complexity limits the likelihood of widespread exploitation. Still, targeted attacks against high-value systems processing AVIF images could leverage this flaw to disrupt services or corrupt data.
Mitigation Recommendations
European organizations should proactively identify all software and systems that incorporate libavif, particularly versions prior to 1.3.0. Since no official patches are linked yet, organizations should monitor vendor advisories and update to libavif 1.3.0 or later once available. In the interim, restrict local access to systems processing AVIF images to trusted users only, and implement strict file validation and sandboxing for AVIF image processing applications to limit potential damage from malformed files. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior related to image processing. Additionally, conduct code audits or use static analysis tools on in-house software that integrates libavif to identify and mitigate unsafe usage patterns. Network segmentation and strict control over removable media can reduce the risk of malicious AVIF files reaching vulnerable systems. Finally, raise user awareness about the risks of opening untrusted image files locally.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aebed8
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/12/2025, 12:04:09 AM
Last updated: 8/14/2025, 3:39:24 PM
Views: 23
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.