VYPR
High severity7.5NVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-8813

CVE-2026-8813

Description

This affects versions of the package exifreader before 4.39.0. A crafted image containing an ICC mluc tag can set an attacker-controlled record count together with a zero record size. During parsing, ExifReader repeatedly processes the same record and appends entries to an array without sufficient bounds validation, causing excessive memory growth. In applications that parse attacker-supplied images, this may lead to denial of service through memory exhaustion.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ExifReader before 4.39.0 fails to validate an ICC mluc tag's record size, enabling an infinite loop that exhausts memory via crafted images.

Vulnerability

The vulnerability exists in the exifreader package before version 4.39.0 in the parsing of ICC profile mluc (multiLocalizedUnicode) tags. When a crafted image provides an attacker-controlled record count together with a zero record size, the parser repeatedly processes the same record without advancing the read offset, causing unbounded memory allocation. Affected versions are all releases prior to 4.39.0 [1][2].

Exploitation

An attacker can exploit this vulnerability by supplying a specially crafted image (e.g., a JPEG file with an embedded ICC profile) to an application that uses exifreader to parse image metadata. The attacker sets numRecords to a very large value (e.g., 0x7fffffff) and recordSize to zero in the mluc tag. When ExifReader.load() is called on the crafted image, the parser loops over the claimed records without consuming any new data, leading to rapid memory consumption. No authentication or special network access is required beyond the ability to provide the malicious image to the target application [2].

Impact

Successful exploitation results in denial of service through memory exhaustion. The attacker can cause the host application to run out of memory and crash, disrupting service. There is no indication of data leakage or code execution; the impact is limited to availability [1][2].

Mitigation

The vulnerability is fixed in ExifReader version 4.39.0. Users should upgrade to this version or later [1]. The fix adds bounds checks to the ICC mluc tag parsing to ensure the declared record size actually advances the read offset before iterating [1]. No workarounds are documented; upgrading is the recommended action.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.