Back to VulnFeed / CVE-2026-42217
root@hackertop:~/vulnfeed/CVE-2026-42217#
CVE-2026-42217 MEDIUM Path Traversal ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

AcademySoftwareFoundation OpenEXR up to 3.2.8/3.3.10/3.4.10 EXR File readVariableLengthInteger integer overflow

OpenEXR 14d ago Impact pending confirmation
LIFECYCLE
6.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability has been found in AcademySoftwareFoundation OpenEXR up to 3.2.8/3.3.10/3.4.10 and classified as critical. This vulnerability affects the function readVariableLengthInteger of the component EXR File Handler. Upgrading to version 3.2.9, 3.3.11 or 3.4.11 eliminates this vulnerability. Applying the patch 21eaa33bcbbb0c83a5fc42f6b6d65b70a996e63c is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-190. The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 3.2.9, 3.3.11 or 3.4.11 eliminates this vulnerability. Applying the patch 21eaa33bcbbb0c83a5fc42f6b6d65b70a996e63c is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-42217 · CVSS 6.0 · Active Threat