{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64181","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-10-28T21:07:16.440Z","datePublished":"2025-11-10T21:23:04.248Z","dateUpdated":"2025-11-12T21:05:26.971Z"},"containers":{"cna":{"title":"OpenEXR Makes Use of Uninitialized Memory","problemTypes":[{"descriptions":[{"cweId":"CWE-457","lang":"en","description":"CWE-457: Use of Uninitialized Variable","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":2,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-3h9h-qfvw-98hq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-3h9h-qfvw-98hq"},{"name":"https://github.com/user-attachments/files/23024726/archive0.zip","tags":["x_refsource_MISC"],"url":"https://github.com/user-attachments/files/23024726/archive0.zip"},{"name":"https://github.com/user-attachments/files/23024736/archive1.zip","tags":["x_refsource_MISC"],"url":"https://github.com/user-attachments/files/23024736/archive1.zip"},{"name":"https://github.com/user-attachments/files/23024740/archive2.zip","tags":["x_refsource_MISC"],"url":"https://github.com/user-attachments/files/23024740/archive2.zip"},{"name":"https://github.com/user-attachments/files/23024744/archive3.zip","tags":["x_refsource_MISC"],"url":"https://github.com/user-attachments/files/23024744/archive3.zip"},{"name":"https://github.com/user-attachments/files/23024746/archive4.zip","tags":["x_refsource_MISC"],"url":"https://github.com/user-attachments/files/23024746/archive4.zip"}],"affected":[{"vendor":"AcademySoftwareFoundation","product":"openexr","versions":[{"version":">= 3.3.0, < 3.3.6","status":"affected"},{"version":">= 3.4.0, < 3.4.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-10T21:23:04.248Z"},"descriptions":[{"lang":"en","value":"OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.5 and 3.4.0 through 3.4.2, while fuzzing `openexr_exrcheck_fuzzer`, Valgrind reports a conditional branch depending on uninitialized data inside `generic_unpack`. This indicates a use of uninitialized memory. The issue can result in undefined behavior and/or a potential crash/denial of service. Versions 3.3.6 and 3.4.3 fix the issue."}],"source":{"advisory":"GHSA-3h9h-qfvw-98hq","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-3h9h-qfvw-98hq","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-12T17:36:24.461719Z","id":"CVE-2025-64181","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-12T21:05:26.971Z"}}]}}