Description
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2701-1 | openexr security update |
Debian DLA |
DLA-3236-1 | openexr security update |
EUVD |
EUVD-2021-26799 | There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability. |
Ubuntu USN |
USN-4900-1 | OpenEXR vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T16:53:17.607Z
Reserved: 2021-03-30T00:00:00.000Z
Link: CVE-2021-3477
No data.
Status : Modified
Published: 2021-03-31T14:15:21.047
Modified: 2024-11-21T06:21:38.260
Link: CVE-2021-3477
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN