OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, applications trust unvalidated dataWindow size values from file headers, which can lead to excessive memory allocation and performance degradation when processing malicious files. This is fixed in version 3.3.3.
History

Sat, 02 Aug 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}

threat_severity

Low


Fri, 01 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 Aug 2025 16:45:00 +0000

Type Values Removed Values Added
Description OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, applications trust unvalidated dataWindow size values from file headers, which can lead to excessive memory allocation and performance degradation when processing malicious files. This is fixed in version 3.3.3.
Title OpenEXR's Unbounded File Header Values can Lead to Out-Of-Memory Errors
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-08-01T16:32:54.595Z

Updated: 2025-08-01T17:09:00.696Z

Reserved: 2025-05-15T16:06:40.942Z

Link: CVE-2025-48074

cve-icon Vulnrichment

Updated: 2025-08-01T17:08:51.656Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-01T17:15:52.193

Modified: 2025-08-04T15:06:15.833

Link: CVE-2025-48074

cve-icon Redhat

Severity : Low

Publid Date: 2025-08-01T16:32:54Z

Links: CVE-2025-48074 - Bugzilla