============================================================================================================================================= | # Title : Samsung libimagecodec.quram.so Out-of-Bounds Read via Malformed DNG ColorMatrix2 | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.3 (64 bits) | | # Vendor : https://www.samsung.com/us/ | ============================================================================================================================================= [+] Summary : A memory safety vulnerability was identified in Samsung’s image decoding library libimagecodec.quram.so, affecting the handling of DNG (Digital Negative) image files. The issue stems from improper bounds validation when parsing the ColorMatrix2 (0xC622) tag within DNG metadata. By supplying a crafted DNG file containing a malformed ColorMatrix2 tag with an unexpected number of entries, the library incorrectly derives the number of color planes and subsequently performs memory access beyond the allocated buffer. This results in an Out-of-Bounds Read, leading to a process crash (SIGSEGV) during image parsing. The vulnerability can be triggered automatically through the Android Media Scanner or manually by opening the malicious DNG file in gallery applications, without requiring user interaction beyond file presence. While the observed impact is a denial of service, the flaw represents a broader risk class associated with unsafe metadata parsing in privileged media components. Samsung addressed this issue in the January 2026 security update [+] POC : #!/usr/bin/env python3 import struct import os def create_malicious_dng(filename="poc.dng"): """ Creates a malicious DNG file that causes the Samsung library to crash """ data = bytearray() data += b'II' data += struct.pack('