CVE-2026-21495

5.5 MEDIUM

📋 TL;DR

A division by zero vulnerability exists in iccDEV's TIFF Image Reader component, which could cause application crashes or denial of service when processing malicious TIFF files. This affects all users of iccDEV libraries and tools prior to version 2.3.1.2.

💻 Affected Systems

Products:
  • iccDEV libraries and tools
Versions: All versions prior to 2.3.1.2
Operating Systems: All platforms where iccDEV is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using iccDEV libraries to process TIFF files is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service, potentially disrupting color management workflows in production systems.

🟠

Likely Case

Application instability or crashes when processing specially crafted TIFF files, requiring restart of affected applications.

🟢

If Mitigated

Minimal impact with proper input validation and error handling in place, though crashes may still occur.

🌐 Internet-Facing: LOW - This vulnerability requires processing of malicious TIFF files, which typically requires user interaction or specific workflows.
🏢 Internal Only: MEDIUM - Internal users processing TIFF files from untrusted sources could trigger the vulnerability, potentially disrupting business processes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to process a malicious TIFF file, which could be delivered via email attachments, downloads, or other file transfer methods.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.1.2

Vendor Advisory: https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-xhrm-79rg-5784

Restart Required: Yes

Instructions:

1. Update iccDEV to version 2.3.1.2 or later. 2. Restart any applications using iccDEV libraries. 3. Recompile any applications that statically link iccDEV libraries.

🔧 Temporary Workarounds

Disable TIFF processing

all

Configure applications to avoid processing TIFF files through iccDEV libraries

Input validation

all

Implement file type validation and sanitization before passing TIFF files to iccDEV

🧯 If You Can't Patch

  • Implement strict file upload controls to prevent processing of untrusted TIFF files
  • Deploy application monitoring to detect and alert on crashes related to TIFF processing

🔍 How to Verify

Check if Vulnerable:

Check iccDEV version using package manager or by examining installed libraries. Versions below 2.3.1.2 are vulnerable.

Check Version:

iccdev --version or check package manager (apt list iccdev, yum list iccdev, etc.)

Verify Fix Applied:

Confirm iccDEV version is 2.3.1.2 or later and test TIFF file processing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing TIFF files
  • Division by zero errors in application logs
  • Unexpected termination of processes using iccDEV

Network Indicators:

  • Unusual file uploads of TIFF format
  • Increased error rates in file processing services

SIEM Query:

source="application.logs" AND ("division by zero" OR "SIGFPE" OR "floating point exception") AND process="*icc*"

🔗 References

📤 Share & Export