TopVuln

High-risk vulnerability digests

CVE-2026-41142

  • HIGH

OpenEXR is Vulnerable to Integer overflow in ImageChannel::resize leads to heap OOB write via OpenEXRUtil public API

Details

CVSS v3
8.8
NVD published
2026-05-07 04:16:26
EPSS
<0.1% probability · 10.2th percentile — 2026-05-11
Affected versions
OpenEXR 3.0.0 to <3.2.9, 3.3.0 to <3.3.11, 3.4.0 to <3.4.11
Summary
This vulnerability exists in the widely used OpenEXR image processing library common in media and motion picture workflows. An integer overflow in the ImageChannel::resize function leads to a heap-based out-of-bounds write accessible via the OpenEXRUtil public API. A threat actor can trigger this flaw by tricking a user or system into processing a maliciously crafted EXR image file.
Remediation
Upgrade OpenEXR to the patched version matching your current release branch: 3.2.9, 3.3.11, or 3.4.11. Scan all untrusted EXR files for malicious content before processing until the patch is applied. Confirm all applications and systems relying on OpenEXR have updated to the fixed version.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.