CVE-2025-12839
DOCUMENTATION: A flaw was found in OpenEXR. This heap-based buffer overflow vulnerability occurs during the parsing of EXR files due to improper validation of user-supplied data length. A remote attacker could exploit this by tricking a user into opening a specially crafted malicious EXR file. Successful exploitation could lead to arbitrary code execution in the context of the current process.
STATEMENT: This vulnerability is rated Important for Red Hat products. Exploitation requires user interaction, where a target must open a specially crafted malicious EXR file.
MITIGATION: Users should exercise caution when handling untrusted EXR files. Avoid opening EXR files from unknown or suspicious sources. Additionally, consider running applications that process EXR files within a sandboxed environment to limit potential impact in case of exploitation.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://access.redhat.com/security/cve/CVE-2025-12839
