CVE-2021-3477Integer Overflow or Wraparound in Openexr

Severity
5.5MEDIUMNVD
EPSS
0.5%
top 33.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateMay 24

Description

There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/openexr< openexr 2.5.4-1 (bookworm)
NVDopenexr/openexr2.5.02.5.4+1
Debianopenexr/openexr< 2.5.4-1+3
CVEListV5openexr/openexrOpenEXR 3.0.0-beta

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wr39-hjqv-c783: There's a flaw in OpenEXR's deep tile sample size calculations in versions before 32022-05-24
OSV
CVE-2021-3477: There's a flaw in OpenEXR's deep tile sample size calculations in versions before 32021-03-31

📋Vendor Advisories

3
Ubuntu
OpenEXR vulnerabilities2021-04-01
Red Hat
OpenEXR: Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts2021-02-15
Debian
CVE-2021-3477: openexr - There's a flaw in OpenEXR's deep tile sample size calculations in versions befor...2021