Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64183: CWE-416: Use After Free in AcademySoftwareFoundation openexr

0
Medium
VulnerabilityCVE-2025-64183cvecve-2025-64183cwe-416
Published: Mon Nov 10 2025 (11/10/2025, 21:29:54 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, there is a use-after-free in PyObject_StealAttrString of pyOpenEXR_old.cpp. The legacy adapter defines PyObject_StealAttrString that calls PyObject_GetAttrString to obtain a new reference, immediately decrefs it, and returns the pointer. Callers then pass this dangling pointer to APIs like PyLong_AsLong/PyFloat_AsDouble, resulting in a use-after-free. This is invoked in multiple places (e.g., reading PixelType.v, Box2i, V2f, etc.) Versions 3.2.5, 3.3.6, and 3.4.3 fix the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:50:04 UTC

Technical Analysis

The vulnerability CVE-2025-64183 affects the openexr library maintained by the AcademySoftwareFoundation, which implements the EXR image format widely used in the motion picture industry. The issue lies in the legacy Python adapter code (pyOpenEXR_old.cpp), specifically in the function PyObject_StealAttrString. This function calls PyObject_GetAttrString to obtain a new Python object reference, immediately decrements the reference count, and returns the pointer. This results in a dangling pointer being returned to the caller. Subsequent calls to Python C API functions such as PyLong_AsLong or PyFloat_AsDouble with this dangling pointer cause a use-after-free condition. This vulnerability is triggered when reading certain EXR file attributes like PixelType.v, Box2i, and V2f, which are common in image processing workflows. The affected versions are 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2. The flaw can lead to memory corruption, application crashes, or potentially arbitrary code execution if an attacker can supply malicious EXR files or manipulate the processing environment. The CVSS 4.0 score is 5.5 (medium severity), reflecting a local attack vector with no privileges or user interaction required but with high impact on availability. The vulnerability was published on November 10, 2025, and fixed in versions 3.2.5, 3.3.6, and 3.4.3. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, particularly those in the media, film production, visual effects, and animation sectors that rely on openexr for image processing, this vulnerability poses a risk of application crashes and potential arbitrary code execution. Exploitation could disrupt production pipelines, cause data corruption, or enable attackers to execute malicious code within the context of affected applications. Since openexr is widely used in professional imaging workflows, any compromise could lead to significant operational downtime and intellectual property risks. The local attack vector means that exploitation requires the ability to process or open crafted EXR files, which could be delivered via insider threats, compromised build systems, or malicious third-party content. The medium severity indicates moderate risk but should not be underestimated given the critical nature of media production environments in Europe.

Mitigation Recommendations

European organizations should immediately upgrade openexr to versions 3.2.5, 3.3.6, or 3.4.3 or later to remediate this vulnerability. Additionally, they should audit and restrict the sources of EXR files processed in their environments to trusted origins only, implementing file integrity checks and sandboxing of image processing workflows to limit the impact of potential exploitation. Employing runtime memory protection tools such as AddressSanitizer or similar can help detect use-after-free issues during development and testing. Monitoring application logs for crashes or unusual behavior related to EXR file handling is recommended. Organizations should also review their Python bindings usage and consider migrating away from legacy adapters if feasible. Finally, incorporating EXR file validation and scanning in the content ingestion pipeline can reduce the risk of malicious file processing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69125dcc44f28dbfe98bf109

Added to database: 11/10/2025, 9:49:00 PM

Last enriched: 11/10/2025, 9:50:04 PM

Last updated: 11/11/2025, 2:56:39 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats