Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-7582
Received
More InfoOfficial Page
Source-cna@vuldb.com
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2026 | 14:16
Updated At-01 May, 2026 | 14:16

A vulnerability was detected in AcademySoftwareFoundation OpenImageIO up to 3.2.0.1-dev. This vulnerability affects unknown code of the file src/dds.imageio/ddsinput.cpp of the component DDS Image Handler. The manipulation results in out-of-bounds write. The attack needs to be approached locally. The exploit is now public and may be used. The patch is identified as 94ec2deec3e3bf2f2e2ff84d008e27425d626fe2. Applying a patch is advised to resolve this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.01.9LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Secondary2.04.3MEDIUM
AV:L/AC:L/Au:S/C:P/I:P/A:P
Type: Secondary
Version: 4.0
Base score: 1.9
Base severity: LOW
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Type: Secondary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-119Primarycna@vuldb.com
CWE-787Primarycna@vuldb.com
CWE ID: CWE-119
Type: Primary
Source: cna@vuldb.com
CWE ID: CWE-787
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/AcademySoftwareFoundation/OpenImageIO/cna@vuldb.com
N/A
https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/94ec2deec3e3bf2f2e2ff84d008e27425d626fe2cna@vuldb.com
N/A
https://github.com/AcademySoftwareFoundation/OpenImageIO/pull/5131cna@vuldb.com
N/A
https://github.com/biniamf/pocs/tree/main/oiio_ddsinput-readimgcna@vuldb.com
N/A
https://vuldb.com/submit/803548cna@vuldb.com
N/A
https://vuldb.com/vuln/360529cna@vuldb.com
N/A
https://vuldb.com/vuln/360529/cticna@vuldb.com
N/A
Hyperlink: https://github.com/AcademySoftwareFoundation/OpenImageIO/
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/94ec2deec3e3bf2f2e2ff84d008e27425d626fe2
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/AcademySoftwareFoundation/OpenImageIO/pull/5131
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/biniamf/pocs/tree/main/oiio_ddsinput-readimg
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/submit/803548
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/vuln/360529
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/vuln/360529/cti
Source: cna@vuldb.com
Resource: N/A
Change History
0Changes found

Details not found