Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64182: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in AcademySoftwareFoundation openexr

0
Medium
VulnerabilityCVE-2025-64182cvecve-2025-64182cwe-120
Published: Mon Nov 10 2025 (11/10/2025, 21:27:21 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, a memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects. Integer overflow and unchecked allocation in InputFile.channel() and InputFile.channels() can lead to heap overflow (32 bit) or a NULL deref (64 bit). Versions 3.2.5, 3.3.6, and 3.4.3 contain a patch for the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:49:49 UTC

Technical Analysis

CVE-2025-64182 is a classic buffer overflow vulnerability categorized under CWE-120, found in the legacy OpenEXR Python adapter (OpenEXR.InputFile wrapper) of the AcademySoftwareFoundation's openexr library. This vulnerability affects multiple versions: 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2. The root cause is an integer overflow combined with unchecked memory allocation in the InputFile.channel() and InputFile.channels() functions. When these functions process attacker-controlled EXR files or crafted Python objects, they can trigger a heap overflow on 32-bit systems or a NULL pointer dereference on 64-bit systems. This memory corruption can lead to application crashes or potentially arbitrary code execution without requiring user interaction, privileges, or network access (local vector). The vulnerability has a CVSS 4.0 base score of 5.5 (medium severity), reflecting limited attack vector (local), low complexity, no privileges or user interaction needed, but high impact on integrity and availability. The issue is fixed in versions 3.2.5, 3.3.6, and 3.4.3. No known exploits are reported in the wild yet. The vulnerability is particularly relevant to organizations using openexr for image processing in motion picture or visual effects pipelines, especially when handling untrusted EXR files or integrating with Python-based workflows.

Potential Impact

For European organizations, especially those in the media, film production, visual effects, and software development sectors, this vulnerability poses a risk of application crashes and potential arbitrary code execution when processing malicious EXR files. This can lead to denial of service, data corruption, or unauthorized code execution within affected systems. Since the vulnerability can be triggered without authentication or user interaction, insider threats or compromised local accounts could exploit it. The impact is heightened in environments where EXR files are exchanged with external partners or downloaded from untrusted sources. Disruption in media production pipelines could cause operational delays and financial losses. Additionally, compromised systems might be leveraged for lateral movement or further attacks within corporate networks. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

European organizations should immediately upgrade all openexr library installations to patched versions 3.2.5, 3.3.6, or 3.4.3 to eliminate the vulnerability. For environments where immediate upgrade is not feasible, implement strict input validation and sanitization of EXR files before processing, including scanning files for anomalies or using sandboxed environments to open untrusted files. Limit access to systems running vulnerable versions to trusted users only and monitor for unusual application crashes or behavior indicative of exploitation attempts. Incorporate file integrity monitoring and logging around EXR file handling processes. Educate developers and operators about the risks of processing untrusted image files and enforce secure coding practices in Python wrappers interacting with native libraries. Finally, maintain up-to-date threat intelligence to detect any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69125dcc44f28dbfe98bf105

Added to database: 11/10/2025, 9:49:00 PM

Last enriched: 11/10/2025, 9:49:49 PM

Last updated: 11/11/2025, 1:20:16 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats