Description
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
Related CPE's
a
openexr
openexr
o
debian
debian_linux
References
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html
https://security.gentoo.org/glsa/202107-27
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html
https://security.gentoo.org/glsa/202107-27
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-01T12:15:13.310Z
4 years agoLast modified
2024-11-21T04:46:18.237Z
1 year ago