


Perceptive Security
SOC/SIEM Consultancy

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. Versions 2.3.1.1 and below have a Heap Buffe…
Published:
23 januari 2026 om 23:00:00
Alert date:
24 januari 2026 om 02:02:34
Source:
nvd.nist.gov
Supply Chain & Dependencies
iccDEV versions 2.3.1.1 and below contain a heap buffer overflow vulnerability in CIccTagNamedColor2::SetSize(). The vulnerability occurs when user-controllable input is unsafely incorporated into ICC profile data or structured binary blobs. Successful exploitation may allow attackers to perform denial of service attacks, manipulate data, bypass application logic, and achieve code execution. The vulnerability has been fixed in version 2.3.1.2.
Technical details
Mitigation steps:
Affected products:
iccDEV
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-24406
https://github.com/InternationalColorConsortium/iccDEV/commit/90c71cba2c563b1f5dc84197f827540d1baaea67
https://github.com/InternationalColorConsortium/iccDEV/issues/480
https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-h9h3-45cm-j95f
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
