{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:49:55.371","vulnerabilities":[{"cve":{"id":"CVE-2026-24856","sourceIdentifier":"security-advisories@github.com","published":"2026-01-28T21:16:13.247","lastModified":"2026-02-03T14:07:59.610","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to unsigned short integer types during ICC profile XML parsing potentially corrupting memory structures and enabling arbitrary code execution. This vulnerability affects users of the iccDEV library who process ICC color profiles. ICC Profile Injection vulnerabilities arise when user-controllable input is incorporated into ICC profile data or other structured binary blobs in an unsafe manner. Version 2.3.1.2 contains a fix for the issue. No known workarounds are available."},{"lang":"es","value":"iccDEV proporciona un conjunto de librerías y herramientas que permiten la interacción, manipulación y aplicación de perfiles de gestión de color ICC. Las versiones anteriores a la 2.3.1.2 tienen un problema de comportamiento indefinido cuando los valores NaN de punto flotante se convierten a tipos de enteros cortos sin signo durante el análisis XML de perfiles ICC, lo que podría corromper las estructuras de memoria y permitir la ejecución de código arbitrario. Esta vulnerabilidad afecta a los usuarios de la librería iccDEV que procesan perfiles de color ICC. Las vulnerabilidades de inyección de perfiles ICC surgen cuando la entrada controlable por el usuario se incorpora a los datos del perfil ICC u otros blobs binarios estructurados de manera insegura. La versión 2.3.1.2 contiene una solución para el problema. No se conocen soluciones alternativas disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-681"},{"lang":"en","value":"CWE-704"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.1.2","matchCriteriaId":"D34CF745-E75A-4F1C-AD7B-9AC1A2E9F680"}]}]}],"references":[{"url":"https://github.com/InternationalColorConsortium/iccDEV/commit/5e53a5d25923b7794ba44e390e9b35d391f2b9c1","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/InternationalColorConsortium/iccDEV/issues/532","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/InternationalColorConsortium/iccDEV/pull/541","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Patch"]},{"url":"https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-w585-cv3v-c396","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}