Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34544: CWE-190: Integer Overflow or Wraparound in AcademySoftwareFoundation openexr

0
High
VulnerabilityCVE-2026-34544cvecve-2026-34544cwe-190cwe-787
Published: Wed Apr 01 2026 (04/01/2026, 20:55:30 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

CVE-2026-34544 is a high-severity integer overflow vulnerability in the AcademySoftwareFoundation's openexr library versions 3. 4. 0 through 3. 4. 7. It affects the decoding of crafted B44 or B44A EXR image files via the exr_decoding_run() function, potentially causing out-of-bounds writes. The primary impact is application crashes, but heap corruption and memory safety issues are also possible, which could be exploited for further attacks. The vulnerability requires local access to process a malicious EXR file and user interaction to trigger the decoding. It has been patched in version 3. 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:23:29 UTC

Technical Analysis

The vulnerability identified as CVE-2026-34544 affects the openexr library, a widely used open-source implementation of the EXR image format standard, primarily utilized in the motion picture and visual effects industry. The flaw exists in versions 3.4.0 up to but not including 3.4.8, specifically in the handling of B44 and B44A compressed EXR files within the exr_decoding_run() function. An attacker can craft a malicious EXR file that triggers an integer overflow or wraparound during decoding, leading to an out-of-bounds write operation. This memory corruption can cause immediate application crashes or corrupt adjacent heap memory, potentially leading to undefined behavior or exploitation opportunities such as arbitrary code execution or privilege escalation. The vulnerability does not require authentication but does require user interaction to open or process the malicious file. The issue stems from improper bounds checking and integer arithmetic errors (CWE-190) combined with buffer overflow conditions (CWE-787). The vulnerability has been addressed in openexr version 3.4.8, where input validation and arithmetic operations were corrected to prevent overflow and out-of-bounds writes.

Potential Impact

The vulnerability poses a significant risk to organizations that utilize openexr for image processing, especially in the media, film, and visual effects sectors. Exploitation can lead to denial of service through application crashes, disrupting production workflows and causing potential data loss. More critically, heap corruption could be leveraged by skilled attackers to execute arbitrary code, compromising system integrity and confidentiality. This could allow attackers to implant malware, steal sensitive media assets, or disrupt rendering pipelines. Since openexr is often integrated into larger software suites or pipelines, the impact could cascade, affecting multiple systems and users. Although no active exploits are currently known, the high CVSS score (8.4) indicates a high likelihood of exploitation once a reliable exploit is developed. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where untrusted files are processed.

Mitigation Recommendations

Organizations should immediately upgrade all instances of openexr to version 3.4.8 or later, where the vulnerability has been patched. For environments where immediate upgrade is not feasible, implement strict file validation and sandboxing of processes that handle EXR files to contain potential crashes and limit damage. Employ application whitelisting and restrict the processing of EXR files from untrusted sources. Security teams should monitor for suspicious activity related to EXR file handling and consider deploying runtime memory protection tools such as AddressSanitizer or Control Flow Integrity mechanisms to detect exploitation attempts. Additionally, review and harden the software supply chain and pipeline integrations that utilize openexr to ensure no untrusted files are processed without inspection. Regularly audit and update third-party libraries to minimize exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:31:39.264Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cd8944e6bfc5ba1dfc32ef

Added to database: 4/1/2026, 9:08:20 PM

Last enriched: 4/1/2026, 9:23:29 PM

Last updated: 4/1/2026, 10:17:31 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses