OpenImageIO CVE-2026-43907: Heap Overflow in DPX Processing
The National Vulnerability Database (NVD) has detailed CVE-2026-43907, a high-severity vulnerability (CVSS 8.3) in OpenImageIO, a critical toolset for VFX and animation image processing. This flaw, present in versions prior to 3.0.18.0 and 3.1.13.0, stems from a signed integer overflow within the QueryRGBBufferSizeInternal() function when handling crafted DPX image files. Specifically, negative multipliers used for buffer size computation can overflow INT_MIN for sufficiently large pixel counts, wrapping to a small positive value.
This incorrect positive value is then interpreted by dpxinput.cpp as a legitimate, albeit undersized, buffer requirement. Consequently, an undersized heap buffer is allocated, leading to a heap-based out-of-bounds write when full image data is subsequently loaded via fread. An attacker can exploit this by distributing a specially crafted DPX file, triggering a denial of service (application crash) or, more critically, achieving arbitrary code execution through heap corruption in any application utilizing OpenImageIO to process pixel data.
This is a classic heap overflow scenario, demonstrating how seemingly innocuous integer arithmetic can lead to catastrophic memory corruption. Defenders must recognize that applications handling image files from untrusted sources are prime targets. The fix is available in OpenImageIO versions 3.0.18.0 and 3.1.13.0, addressing both CWE-190 (Integer Overflow or Wraparound) and CWE-787 (Out-of-bounds Write). Patching is not optional; it’s a direct counter to potential RCE.
What This Means For You
- If your organization uses OpenImageIO in any part of its image processing pipeline, particularly with DPX files, you are at risk. Immediately identify all instances of OpenImageIO and prioritize patching to versions 3.0.18.0 or 3.1.13.0 or later. Audit any applications that ingest DPX files from external sources, as these are the primary attack vector for CVE-2026-43907.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-43907: OpenImageIO DPX Heap Overflow via Crafted File
title: CVE-2026-43907: OpenImageIO DPX Heap Overflow via Crafted File
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
Detects the execution of OpenImageIO tools (like oiiotool) when processing a .dpx file. This is a primary indicator of an attempt to exploit CVE-2026-43907, where a specially crafted DPX file can trigger a heap overflow. This rule is designed to catch the initial execution phase of the exploit.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43907/
tags:
- attack.execution
- attack.t1204.002
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'openimageio'
CommandLine|contains:
- '.dpx'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43907 | Buffer Overflow | OpenImageIO < 3.0.18.0, OpenImageIO < 3.1.13.0 |
| CVE-2026-43907 | Denial of Service | OpenImageIO: crafted DPX image files |
| CVE-2026-43907 | RCE | OpenImageIO: heap corruption via crafted DPX image files |
| CVE-2026-43907 | Memory Corruption | OpenImageIO: QueryRGBBufferSizeInternal() in DPXColorConverter.cpp |
| CVE-2026-43907 | Integer Overflow | OpenImageIO: signed integer overflow in QueryRGBBufferSizeInternal() leading to heap-based out-of-bounds write |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 23:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.