Buffer Overflow Vulnerability in OpenEXR by Google
CVE-2025-59732

8.7HIGH

Key Information:

Vendor

Ffmpeg

Status
Vendor
CVE Published:
6 October 2025

What is CVE-2025-59732?

A vulnerability exists in Google’s OpenEXR when processing images with DWAA or DWAB compression. This issue arises from an assumption that the dimensions of the image, specifically height and width, are divisible by 8. If this condition is not met, the decoding process enters copy loops that continue to write beyond the allocated buffer size, leading to heap memory corruption. This flaw emphasizes the importance of validating image dimensions before processing. Upgrading to OpenEXR version 8.0 or later is recommended to mitigate this risk.

Affected Version(s)

FFmpeg 9a32b863074ed4140141e0d3613905c6f1fe61c5 < 8.0

FFmpeg 7.1.1 < 8.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Google Big Sleep
.
CVE-2025-59732 : Buffer Overflow Vulnerability in OpenEXR by Google