Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64182: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in AcademySoftwareFoundation openexr

0
Medium
VulnerabilityCVE-2025-64182cvecve-2025-64182cwe-120
Published: Mon Nov 10 2025 (11/10/2025, 21:27:21 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, a memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects. Integer overflow and unchecked allocation in InputFile.channel() and InputFile.channels() can lead to heap overflow (32 bit) or a NULL deref (64 bit). Versions 3.2.5, 3.3.6, and 3.4.3 contain a patch for the issue.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:40:04 UTC

Technical Analysis

The vulnerability CVE-2025-64182 affects the OpenEXR library, specifically its legacy Python adapter (OpenEXR.InputFile wrapper), which is used to read EXR image files commonly utilized in the motion picture industry. The flaw is a classic buffer overflow (CWE-120) caused by integer overflow and unchecked memory allocation when invoking InputFile.channel() and InputFile.channels() methods. This leads to heap overflow on 32-bit architectures or NULL pointer dereference on 64-bit architectures. The root cause lies in improper validation of input sizes before copying data, allowing an attacker to craft malicious EXR files or Python objects that trigger unsafe memory operations. Successful exploitation can cause application crashes and potentially arbitrary code execution without requiring authentication or user interaction, as the vulnerability is triggered simply by opening a malicious file or passing crafted objects. The affected versions span multiple release branches (3.2.x, 3.3.x, 3.4.x) prior to their respective patch releases. The CVSS 4.0 base score is 5.5 (medium severity), reflecting local attack vector, low complexity, no privileges or user interaction required, but high impact on integrity and availability. No known exploits have been reported in the wild, but the vulnerability poses a risk to systems processing untrusted EXR files, especially in automated pipelines or environments where files from external sources are opened. The patch is available in versions 3.2.5, 3.3.6, and 3.4.3, which fix the integer overflow and memory allocation checks.

Potential Impact

For European organizations, especially those in the media, film production, and visual effects sectors that rely on OpenEXR for image processing, this vulnerability could lead to denial of service or remote code execution within their production pipelines. Automated systems that ingest EXR files from external collaborators or third parties are at particular risk. Exploitation could disrupt critical workflows, cause data corruption, or enable attackers to execute arbitrary code with the privileges of the affected application, potentially leading to broader network compromise. Given the use of OpenEXR in high-value creative industries across Europe, including in countries with large media sectors such as the UK, Germany, France, and the Netherlands, the impact could be significant. Additionally, organizations using Python-based tools or scripts that utilize the legacy OpenEXR adapter are vulnerable. The lack of authentication or user interaction requirements increases the risk in environments where untrusted files are processed automatically. While no exploits are currently known, the medium severity rating and potential for code execution warrant prompt remediation to avoid operational disruption and intellectual property theft.

Mitigation Recommendations

European organizations should immediately upgrade all OpenEXR installations to patched versions 3.2.5, 3.3.6, or 3.4.3, depending on their current version branch. For environments where upgrading is not immediately feasible, implement strict input validation and sandboxing of processes handling EXR files to limit the impact of potential exploitation. Disable or replace usage of the legacy OpenEXR Python adapter (OpenEXR.InputFile wrapper) in favor of supported APIs that do not contain this vulnerability. Establish file integrity verification and source validation for all EXR files received from external sources to prevent malicious file ingestion. Incorporate runtime protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation attempts. Monitor application logs and system behavior for crashes or anomalies related to EXR file processing. Finally, conduct security awareness training for developers and operators about the risks of processing untrusted image files and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69125dcc44f28dbfe98bf105

Added to database: 11/10/2025, 9:49:00 PM

Last enriched: 11/17/2025, 10:40:04 PM

Last updated: 12/23/2025, 2:09:56 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats