CVE-2024-40630
📋 TL;DR
This vulnerability in OpenImageIO's HEIF image processing functionality allows information disclosure when processing malicious HEIF files. It affects applications that directly use OpenImageIO's ImageInput APIs to read HEIF images. The bug occurs in the seek_subimage() function and could leak memory contents.
💻 Affected Systems
- OpenImageIO
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Sensitive memory contents could be disclosed to an attacker, potentially revealing application data, credentials, or other confidential information.
Likely Case
Limited information disclosure of non-critical memory regions when processing specially crafted HEIF files.
If Mitigated
No impact if patched version is used or if HEIF processing is disabled.
🎯 Exploit Status
Exploitation requires crafting malicious HEIF files and getting them processed by vulnerable OpenImageIO applications.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.13.1
Vendor Advisory: https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2
Restart Required: Yes
Instructions:
1. Update OpenImageIO to version 2.5.13.1 or later. 2. Rebuild any applications using OpenImageIO. 3. Restart affected services.
🔧 Temporary Workarounds
Disable HEIF processing
allDisable HEIF image format support in OpenImageIO if not required
Recompile OpenImageIO with HEIF support disabled
🧯 If You Can't Patch
- Implement strict input validation for HEIF files
- Isolate image processing services in restricted environments
🔍 How to Verify
Check if Vulnerable:
Check OpenImageIO version: oiiotool --version
Check Version:
oiiotool --version | grep -i version
Verify Fix Applied:
Verify version is 2.5.13.1 or later and test HEIF file processing
📡 Detection & Monitoring
Log Indicators:
- Crashes or abnormal behavior when processing HEIF files
- Memory access violations in OpenImageIO processes
Network Indicators:
- Unusual HEIF file uploads to image processing services
SIEM Query:
Process:OpenImageIO AND (EventID:1000 OR ExceptionCode:c0000005)
🔗 References
- https://github.com/AcademySoftwareFoundation/OpenImageIO/blob/7c486a1121a4bf71d50ff555fab2770294b748d7/src/heif.imageio/heifinput.cpp#L250
- https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/0a2dcb4cf2c3fd4825a146cd3ad929d9d8305ce3
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2
- https://github.com/AcademySoftwareFoundation/OpenImageIO/blob/7c486a1121a4bf71d50ff555fab2770294b748d7/src/heif.imageio/heifinput.cpp#L250
- https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/0a2dcb4cf2c3fd4825a146cd3ad929d9d8305ce3
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2