CVE-2021-3479

EUVD-2021-26801
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
Affected Products (NVD)
VendorProductVersion
openexropenexr
𝑥
< 2.4.3
openexropenexr
2.5.0 ≤
𝑥
< 2.5.4
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bookworm
3.1.5-5
fixed
bullseye
2.5.4-2+deb11u1
fixed
bullseye (security)
2.5.4-2+deb11u1
fixed
sid
3.1.5-5.1
fixed
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openexr
bionic
Fixed 2.2.0-11.1ubuntu1.6
released
focal
Fixed 2.3.0-6ubuntu0.5
released
groovy
Fixed 2.5.3-2ubuntu0.2
released
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
dne
xenial
Fixed 2.2.0-10ubuntu2.6
released