Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3478

Опубликовано: 31 мар. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.5

Описание

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

РелизСтатусПримечание
bionic

released

2.2.0-11.1ubuntu1.6
devel

not-affected

2.5.7-1
esm-apps/focal

released

2.3.0-6ubuntu0.5
esm-apps/jammy

not-affected

2.5.7-1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.2.0-11.1ubuntu1.6
esm-infra/xenial

released

2.2.0-10ubuntu2.6
focal

released

2.3.0-6ubuntu0.5
groovy

released

2.5.3-2ubuntu0.2
hirsute

not-affected

2.5.4-1

Показывать по

EPSS

Процентиль: 66%
0.00507
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
почти 5 лет назад

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

CVSS3: 5.5
nvd
почти 5 лет назад

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

CVSS3: 5.5
debian
почти 5 лет назад

There's a flaw in OpenEXR's scanline input file functionality in versi ...

CVSS3: 5.5
github
больше 3 лет назад

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

CVSS3: 5.5
fstec
около 5 лет назад

Уязвимость реализации метода сжатия файла с использованием строки сканирования Zip (per scanline) (ImfScanLineInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 66%
0.00507
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3