When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.
References
History

Mon, 06 Oct 2025 08:15:00 +0000

Type Values Removed Values Added
Description When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.
Title Heap-buffer-overflow write in FFmpeg EXR dwa_uncompress
Weaknesses CWE-787
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-10-06T08:09:23.410Z

Reserved: 2025-09-19T08:11:37.550Z

Link: CVE-2025-59731

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-06T08:15:34.770

Modified: 2025-10-06T08:15:34.770

Link: CVE-2025-59731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.