The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34544

CVE-2026-34544: OpenEXR Buffer Overflow Vulnerability

CVE-2026-34544 is a buffer overflow vulnerability in OpenEXR that allows crafted B44/B44A files to trigger out-of-bounds writes, causing crashes or heap corruption. This article covers technical details, affected versions, and mitigation.

Published: April 2, 2026

CVE-2026-34544 Overview

CVE-2026-34544 is an integer overflow vulnerability (CWE-190) in OpenEXR, the specification and reference implementation of the EXR file format widely used in the motion picture industry. The vulnerability exists in versions 3.4.0 through 3.4.7 and allows a crafted B44 or B44A EXR file to trigger an out-of-bounds write when decoded via the exr_decoding_run() function.

Critical Impact

A specially crafted EXR image file can cause memory corruption ranging from immediate application crashes to corruption of adjacent heap allocations, potentially enabling code execution in applications that process untrusted EXR files.

Affected Products

  • OpenEXR versions 3.4.0 through 3.4.7
  • Applications using OpenEXR library for EXR image decoding
  • Software in motion picture, VFX, and digital imaging pipelines that process untrusted EXR files

Discovery Timeline

  • 2026-04-01 - CVE-2026-34544 published to NVD
  • 2026-04-01 - Last updated in NVD database

Technical Details for CVE-2026-34544

Vulnerability Analysis

This vulnerability stems from an integer overflow condition in the B44 and B44A image compression codec implementation within OpenEXR. When processing crafted EXR files, the calculation of row offsets in the decompression routine can overflow due to insufficient integer width, causing the resulting pointer arithmetic to produce incorrect memory addresses. This leads to writes outside the bounds of allocated buffer memory.

The B44 and B44A compression formats are designed for high dynamic range (HDR) images and are commonly used in film production workflows. Any application that decodes EXR files using the vulnerable exr_decoding_run() function is susceptible to this issue when processing malicious input files.

Root Cause

The root cause is an integer overflow in the row offset calculation within src/lib/OpenEXRCore/internal_b44.c. The original code computed row offsets using standard integer multiplication (y * nx), which can overflow when processing images with large dimensions. The multiplication result exceeded the maximum value representable by the integer type, wrapping around to a smaller value and causing subsequent pointer arithmetic to reference incorrect memory locations.

Attack Vector

This is a local attack vector requiring user interaction. An attacker must craft a malicious B44 or B44A compressed EXR file with specific dimension parameters designed to trigger the integer overflow. The victim must then open or process this file with an application using a vulnerable version of OpenEXR. Attack scenarios include:

  • Malicious EXR files distributed via email or file sharing
  • Compromised assets in content pipelines
  • User-uploaded images on processing servers
c
             // rightmost column and the bottom row.
             //
             uint16_t *row0, *row1, *row2, *row3;
+            /* row offset in elements: use uint64_t so y*nx cannot overflow int */
+            uint64_t row_off = (uint64_t) (y) * (uint64_t) (nx);
 
-            row0 = (uint16_t*) scratch;
-            row0 += y * nx;
-
-            row1 = row0 + nx;
-            row2 = row1 + nx;
-            row3 = row2 + nx;
+            row0 = (uint16_t*) scratch + row_off;
+            row1 = row0 + (uint64_t) nx;
+            row2 = row1 + (uint64_t) nx;
+            row3 = row2 + (uint64_t) nx;
 
             if (y + 3 >= ny)
             {

Source: GitHub Commit 35e7aa35e22c1975606be86e859f31cc1fc598ee

The patch addresses the vulnerability by changing the row_off variable type from an implicit 32-bit integer to an explicit uint64_t. This ensures the multiplication y * nx is performed with 64-bit precision, preventing overflow for any reasonable image dimensions. The subsequent pointer arithmetic also uses uint64_t casts to maintain consistency.

Detection Methods for CVE-2026-34544

Indicators of Compromise

  • Application crashes or unexpected termination when opening EXR files
  • Memory corruption errors or heap violations in EXR processing applications
  • Anomalous EXR files with unusually large dimension parameters in image metadata
  • Core dumps or crash reports referencing OpenEXR library functions, particularly exr_decoding_run() or B44/B44A decompression routines

Detection Strategies

  • Monitor for application crashes in processes that handle EXR file decoding
  • Implement file integrity monitoring for EXR assets in content pipelines
  • Deploy endpoint detection to identify exploitation attempts via malformed image files
  • Use memory safety tools (AddressSanitizer, Valgrind) during development and testing to detect out-of-bounds writes

Monitoring Recommendations

  • Enable crash reporting and telemetry for applications using OpenEXR
  • Monitor system logs for segmentation faults in image processing workflows
  • Track OpenEXR library version usage across the environment to identify vulnerable deployments
  • Implement file validation checks for EXR files from untrusted sources before processing

How to Mitigate CVE-2026-34544

Immediate Actions Required

  • Upgrade OpenEXR to version 3.4.8 or later immediately
  • Audit applications and dependencies for OpenEXR library usage
  • Restrict processing of EXR files from untrusted sources until patches are applied
  • Implement sandboxing for applications that process untrusted image files

Patch Information

The vulnerability has been patched in OpenEXR version 3.4.8. The fix modifies the row offset calculation in src/lib/OpenEXRCore/internal_b44.c to use 64-bit integer arithmetic, preventing the integer overflow condition.

  • Patched Version:OpenEXR v3.4.8
  • Security Advisory:GHSA-h762-rhv3-h25v
  • Commit:35e7aa35e22c1975606be86e859f31cc1fc598ee

Workarounds

  • Avoid processing B44 or B44A compressed EXR files from untrusted sources until the patch is applied
  • Convert untrusted EXR files to alternative formats using patched tools before processing
  • Implement process isolation or sandboxing for EXR file processing to limit impact of exploitation
  • Use file validation to reject EXR files with anomalous dimension parameters
bash
# Verify OpenEXR version and upgrade
pkg-config --modversion OpenEXR

# For systems using package managers, upgrade to patched version
# Example for systems building from source:
git clone https://github.com/AcademySoftwareFoundation/openexr.git
cd openexr
git checkout v3.4.8
mkdir build && cd build
cmake ..
make && sudo make install

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechOpenexr

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Technical References
  • GitHub Commit Update

  • GitHub Release Version 3.4.8

  • GitHub Security Advisory GHSA-h762-rhv3-h25v
  • Related CVEs
  • CVE-2026-34379: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-34380: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-34588: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-34589: OpenEXR Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English