CVE-2026-34543: Heap Information Disclosure in OpenEXR PXR24 Decompression
Vulnerability ID: CVE-2026-34543
CVSS Score: 8.7
Published: 2026-04-03
A critical heap information disclosure vulnerability in OpenEXR allows remote attackers to leak uninitialized heap memory contents via maliciously crafted EXR files. The flaw exists in the PXR24 decompression logic, where missing bounds checks on truncated zlib streams lead to out-of-bounds reads during image reconstruction.
TL;DR
OpenEXR versions 3.4.0 through 3.4.7 fail to validate decompressed stream lengths in the PXR24 decoder. An attacker can craft a truncated EXR file that leaks uninitialized heap memory into pixel data. Updating to version 3.4.8 resolves the vulnerability.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-908
- Attack Vector: Network
- CVSS v4.0: 8.7 (High)
- EPSS Score: 0.04%
- Impact: High Confidentiality (Heap Memory Disclosure)
- Exploit Status: PoC
- CISA KEV: False
Affected Systems
- Applications dynamically linking OpenEXRCore 3.4.0 - 3.4.7
- Applications statically compiling OpenEXR 3.4.0 - 3.4.7
- Cloud rendering services accepting user-uploaded EXR files
- Media processing pipelines using affected OpenEXR implementations
-
OpenEXR: 3.4.0 - 3.4.7 (Fixed in:
3.4.8)
Code Analysis
Commit: 5f6d0aa
Fix bounds check in undo_pxr24_impl to prevent uninitialized memory read
- if (nDec + nBytes > uncompressed_size)
+ if (nDec + nBytes > outSize)
return EXR_ERR_CORRUPT_CHUNK;
Exploit Details
- Research Analysis: Proof of concept methodology detailed in GitHub Advisory analysis.
Mitigation Strategies
- Update OpenEXR library to version 3.4.8 or later
- Recompile applications statically linked against vulnerable versions of libOpenEXRCore
- Isolate image processing tasks in short-lived, sandboxed environments to minimize heap value
- Implement strict input validation for external media files
Remediation Steps:
- Identify all internal applications and third-party dependencies utilizing OpenEXR.
- Upgrade the OpenEXR dependency to v3.4.8 within package managers and build manifests.
- Rebuild and redeploy applications statically linking the library.
- Monitor application crash logs or unexpected image artifacts during file processing.
References
- GitHub Advisory: GHSA-vc68-257w-m432
- Fix Commit in OpenEXR Repository
- OpenEXR v3.4.8 Release
- NVD Entry for CVE-2026-34543
- CVE Record
Read the full report for CVE-2026-34543 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)