vulnerability

Amazon Linux 2023: CVE-2025-12839: Important priority package update for openexr

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Dec 23, 2025
Added
Jan 26, 2026
Modified
Jan 26, 2026

Description

Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27947.
A flaw was found in OpenEXR. This heap-based buffer overflow vulnerability occurs during the parsing of EXR files due to improper validation of user-supplied data length. A remote attacker could exploit this by tricking a user into opening a specially crafted malicious EXR file. Successful exploitation could lead to arbitrary code execution in the context of the current process.

Solutions

amazon-linux-2023-upgrade-openexramazon-linux-2023-upgrade-openexr-debuginfoamazon-linux-2023-upgrade-openexr-debugsourceamazon-linux-2023-upgrade-openexr-develamazon-linux-2023-upgrade-openexr-libsamazon-linux-2023-upgrade-openexr-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.