Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3949: Out-of-Bounds Read in strukturag libheif

0
Medium
VulnerabilityCVE-2026-3949cvecve-2026-3949
Published: Wed Mar 11 2026 (03/11/2026, 18:32:09 UTC)
Source: CVE Database V5
Vendor/Project: strukturag
Product: libheif

Description

CVE-2026-3949 is a medium-severity vulnerability in strukturag libheif versions up to 1. 21. 2, specifically in the HEIF file parser component's vvdec_push_data2 function. It allows a local attacker with limited privileges to trigger an out-of-bounds read by manipulating the size argument, potentially leading to information disclosure or application instability. Exploitation requires local access and no user interaction is needed. Although the exploit has been publicly disclosed, no known active exploitation in the wild has been reported. A patch identified by commit b97c8b5f198b27f375127cd597a35f2113544d03 addresses this issue. Organizations using libheif in media processing or image handling should apply the patch promptly to mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:28:33 UTC

Technical Analysis

CVE-2026-3949 is an out-of-bounds read vulnerability found in the strukturag libheif library, versions 1.21.0 through 1.21.2. The flaw resides in the vvdec_push_data2 function within the HEIF file parser plugin (libheif/plugins/decoder_vvdec.cc). By manipulating the size parameter passed to this function, a local attacker with limited privileges can cause the program to read memory beyond the intended buffer boundaries. This can lead to unintended information disclosure or cause the application to crash, potentially affecting the stability and security of software relying on libheif for HEIF image decoding. The vulnerability requires local access and does not need user interaction or elevated privileges beyond limited local rights. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been observed in the wild. The issue is addressed by a patch (commit b97c8b5f198b27f375127cd597a35f2113544d03), which corrects the bounds checking in the affected function. Given libheif's use in various media applications and operating systems, unpatched systems remain vulnerable to potential attacks that could compromise confidentiality or cause denial of service.

Potential Impact

The primary impact of CVE-2026-3949 is an out-of-bounds read that can lead to information disclosure or application crashes. For organizations, this could mean leakage of sensitive memory contents or instability in applications processing HEIF images, potentially disrupting workflows or services that rely on media processing. Since exploitation requires local access, the threat is mainly to environments where untrusted users have some level of system access, such as multi-user systems, shared workstations, or developer environments. The vulnerability could be leveraged as part of a larger attack chain to gather information or cause denial of service. Although the CVSS score is medium (4.8), the risk increases in environments where libheif is widely used and local user access is common. Failure to patch could expose organizations to data leakage or service interruptions, impacting confidentiality and availability.

Mitigation Recommendations

Organizations should promptly apply the official patch identified by commit b97c8b5f198b27f375127cd597a35f2113544d03 to all affected libheif versions (1.21.0 through 1.21.2). Additionally, limit local access to trusted users only, especially on systems processing HEIF images. Employ strict access controls and user privilege management to reduce the risk of local exploitation. Monitor systems for unusual crashes or memory access errors related to media processing applications. Where possible, use updated versions of libheif beyond 1.21.2 that include the fix. For environments where patching is delayed, consider sandboxing or isolating applications that use libheif to minimize potential impact. Regularly audit software dependencies and maintain an inventory of media libraries to ensure timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-11T11:59:39.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1b88a2f860ef943602144

Added to database: 3/11/2026, 6:46:34 PM

Last enriched: 3/18/2026, 7:28:33 PM

Last updated: 4/28/2026, 7:29:14 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses