CVE-2023-5841Heap-based Buffer Overflow in Openexr

Severity
9.1CRITICALNVD
EPSS
0.8%
top 25.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 1
Latest updateSep 16

Description

Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages8 packages

debiandebian/openexr< openexr 3.1.13-1 (forky)
Debianopenexr/openexr< 3.1.13-1+1
NVDopenexr/openexr3.2.1
Appleapple/tvos18

🔴Vulnerability Details

2
OSV
CVE-2023-5841: Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX imag2024-02-01
GHSA
GHSA-gxmr-rxpv-c8fq: Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX imag2024-02-01

📋Vendor Advisories

6
Apple
CVE-2023-5841: tvOS 182024-09-16
Apple
CVE-2023-5841: iOS 18 and iPadOS 182024-09-16
Apple
CVE-2023-5841: macOS Sequoia 152024-09-16
Apple
CVE-2023-5841: visionOS22024-09-16
Red Hat
OpenEXR: Heap Overflow in Scanline Deep Data Parsing2024-02-01