CVE-2023-42299

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in OpenImageIO's read_subimage_data function allows remote attackers to execute arbitrary code or cause denial of service. This affects systems using OpenImageIO v2.4.12.0 to process untrusted image files. The high CVSS score indicates critical severity with network-accessible attack vectors.

💻 Affected Systems

Products:
  • OpenImageIO
Versions: v2.4.12.0
Operating Systems: All platforms running OpenImageIO
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using OpenImageIO to process image files is vulnerable if handling untrusted input.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Denial of service through application crashes when processing malicious image files.

🟢

If Mitigated

Limited impact if systems are patched, use input validation, or restrict untrusted file processing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities in image processing libraries are frequently exploited via crafted files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.4.13.0 or later

Vendor Advisory: https://github.com/OpenImageIO/oiio/issues/3840

Restart Required: Yes

Instructions:

1. Check current version with 'oiiotool --version'. 2. Update OpenImageIO using package manager or compile from source. 3. Restart any services using OpenImageIO.

🔧 Temporary Workarounds

Input Validation

all

Implement strict validation of image files before processing with OpenImageIO.

Sandbox Processing

linux

Run OpenImageIO in isolated containers or sandboxes with limited permissions.

docker run --read-only --cap-drop=ALL -v /trusted:/data openimageio

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using OpenImageIO from untrusted networks.
  • Deploy application allowlisting to prevent execution of unauthorized code.

🔍 How to Verify

Check if Vulnerable:

Run 'oiiotool --version' and check if output shows v2.4.12.0.

Check Version:

oiiotool --version

Verify Fix Applied:

Confirm version is v2.4.13.0 or later with 'oiiotool --version'.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unusual memory access patterns in OpenImageIO processes

Network Indicators:

  • Unexpected network connections from OpenImageIO processes
  • Large volumes of image file transfers to vulnerable systems

SIEM Query:

process_name:"oiiotool" AND (event_type:crash OR memory_usage:spike)

🔗 References

📤 Share & Export