{"id":"CVE-2025-48073","summary":"OpenEXR ScanLineProcess::run_fill NULL Pointer Write In \"reduceMemory\" Mode","details":"OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, when reading a deep scanline image with a large sample count in reduceMemory mode, it is possible to crash a target application with a NULL pointer dereference in a write operation. This is fixed in version 3.3.3.","aliases":["GHSA-qhpm-86v7-phmm"],"modified":"2026-04-10T05:28:09.016515Z","published":"2025-07-31T20:25:51.545Z","related":["openSUSE-SU-2025:15415-1"],"database_specific":{"cwe_ids":["CWE-476"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48073.json"},"references":[{"type":"WEB","url":"https://github.com/ShielderSec/poc/tree/main/CVE-2025-48073"},{"type":"ADVISORY","url":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-qhpm-86v7-phmm"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48073.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48073"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/academysoftwarefoundation/openexr","events":[{"introduced":"55d1a1404cec5b4b187009d9f7fe55a5622ac4e5"},{"fixed":"da760aa4b6bee4b9d74b8c6a151221b035fc47b7"}],"database_specific":{"versions":[{"introduced":"3.3.2"},{"fixed":"3.3.3"}]}}],"versions":["v3.3.2","v3.3.2-rc4","v3.3.3-rc"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48073.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/openexr/openexr","events":[{"introduced":"0"},{"last_affected":"55d1a1404cec5b4b187009d9f7fe55a5622ac4e5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.3.2"}]}}],"versions":["OPENEXR_1_0_4","v1.7.1","v2.0.0","v2.0.0.GM","v2.0.1","v2.1.0","v2.3.0","v2.4.0","v2.4.0-beta.1","v2.5.0","v3.0.0-beta","v3.2.0-rc","v3.3.0","v3.3.0-rc","v3.3.0-rc1","v3.3.0-rc2","v3.3.1","v3.3.1-rc","v3.3.2","v3.3.2-rc","v3.3.2-rc2","v3.3.2-rc3","v3.3.2-rc4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48073.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}]}