Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vv3j-gmj6-g343

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

EPSS

Процентиль: 64%
0.0048
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-400
CWE-770

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 6.2
redhat
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 5.5
nvd
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

CVSS3: 5.5
debian
почти 5 лет назад

There's a flaw in OpenEXR's Scanline API functionality in versions bef ...

CVSS3: 5.5
fstec
больше 5 лет назад

Уязвимость интерфейса Scanline API библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 64%
0.0048
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-400
CWE-770