CVE-2024-55195

7.5 HIGH

📋 TL;DR

CVE-2024-55195 is an allocation-size-too-big vulnerability in OpenImageIO's image buffer component that can cause denial of service through excessive memory allocation. This affects systems running vulnerable versions of OpenImageIO when processing malicious image files. Users and applications that utilize OpenImageIO for image processing are potentially impacted.

💻 Affected Systems

Products:
  • OpenImageIO
Versions: v3.1.0.0dev (development version)
Operating Systems: All platforms running OpenImageIO
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the development version 3.1.0.0dev; stable releases are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system instability or crash due to memory exhaustion, potentially affecting other services on the same host.

🟠

Likely Case

Application crash or hang when processing specially crafted image files, leading to service disruption.

🟢

If Mitigated

Application gracefully handles the allocation failure with minimal disruption to other services.

🌐 Internet-Facing: MEDIUM - Exploitation requires processing malicious image files, which could be uploaded via web interfaces or APIs.
🏢 Internal Only: LOW - Requires local access to feed malicious files to vulnerable applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious image files that trigger the allocation bug. No authentication bypass is needed if the application processes untrusted files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to a stable release (not 3.1.0.0dev) or apply the fix from GitHub issue #4553

Vendor Advisory: https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553

Restart Required: No

Instructions:

1. Check current OpenImageIO version. 2. If using v3.1.0.0dev, update to a stable release or apply the patch from GitHub. 3. Recompile/reinstall OpenImageIO. 4. Restart any services using OpenImageIO.

🔧 Temporary Workarounds

Input validation and sanitization

all

Implement strict validation of image file inputs before processing with OpenImageIO

Resource limits

Linux/Unix

Set memory limits on processes using OpenImageIO to contain potential DoS impact

ulimit -v [memory_limit_in_kb]

🧯 If You Can't Patch

  • Implement strict input validation for all image files processed by OpenImageIO
  • Isolate OpenImageIO processes with containerization or sandboxing to limit blast radius

🔍 How to Verify

Check if Vulnerable:

Check OpenImageIO version: oiiotool --version | grep 'OpenImageIO'

Check Version:

oiiotool --version

Verify Fix Applied:

Verify version is not v3.1.0.0dev and test with known safe image files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal termination when processing image files
  • Memory allocation errors in application logs
  • High memory usage spikes followed by process termination

Network Indicators:

  • Unusually large image file uploads to services using OpenImageIO

SIEM Query:

source="application_logs" AND ("segmentation fault" OR "out of memory" OR "allocation failed") AND process="*OpenImageIO*"

🔗 References

📤 Share & Export