CVE-2021-3478
Description
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
References
CvssV3 impact
BaseSeverity | MEDIUM |
ConfidentialityImpact | NONE |
AttackComplexity | LOW |
Scope | UNCHANGED |
AttackVector | LOCAL |
AvailabilityImpact | HIGH |
IntegrityImpact | NONE |
PrivilegesRequired | NONE |
BaseScore | 5.5 |
VectorString | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Version | 3.1 |
UserInteraction | REQUIRED |
CvssV2 impact
AccessComplexity | MEDIUM |
ConfidentialityImpact | NONE |
AvailabilityImpact | PARTIAL |
IntegrityImpact | NONE |
BaseScore | 4.3 |
VectorString | AV:N/AC:M/Au:N/C:N/I:N/A:P |
Version | 2.0 |
AccessVector | NETWORK |
Authentication | NONE |