Permalink
CVE-2026-3949
3.3 LOW
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
strukturag libheif HEIF File decoder_vvdec.cc vvdec_push_data2 out-of-bounds
A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
References
- VDB-350381 | strukturag libheif HEIF File decoder_vvdec.cc vvdec_push_data2 out-of-bounds vdb-entry technical-description
- VDB-350381 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #765979 | strukturag libheif 1.21.2 Out-of-Bounds Read third-party-advisory
- https://github.com/strukturag/libheif/issues/1712 issue-tracking
- https://github.com/strukturag/libheif/issues/1712#issuecomment-3947938531 issue-tracking
- https://github.com/biniamf/pocs/tree/main/libheif_vvdec exploit
- https://github.com/strukturag/libheif/commit/b97c8b5f198b27f375127cd597a35f2113… patch
- https://github.com/strukturag/libheif/ product
Affected products
libheif
- ==1.21.0
- ==1.21.2
- ==1.21.1
Package maintainers
-
@kuflierl Kennet Flierl <kuflierl@gmail.com>