Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3479

Опубликовано: 31 мар. 2021
Источник: debian
EPSS Низкий

Описание

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openexrfixed2.5.4-1package

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370

  • https://github.com/AcademySoftwareFoundation/openexr/commit/d80f11f4f55100d007ae80a162bf257ec291612c

  • https://github.com/AcademySoftwareFoundation/openexr/pull/830

EPSS

Процентиль: 65%
0.0048
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 6.2
redhat
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 5.5
nvd
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 5.5
github
больше 3 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 5.5
fstec
больше 5 лет назад

Уязвимость интерфейса Scanline API библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 65%
0.0048
Низкий