CVE-2021-3479

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
openexropenexr
𝑥
< 2.4.3
openexropenexr
2.5.0 ≤
𝑥
< 2.5.4
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bullseye (security)
2.5.4-2+deb11u1
fixed
bullseye
2.5.4-2+deb11u1
fixed
bookworm
3.1.5-5
fixed
sid
3.1.5-5.1
fixed
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openexr
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
Fixed 2.5.3-2ubuntu0.2
released
focal
Fixed 2.3.0-6ubuntu0.5
released
bionic
Fixed 2.2.0-11.1ubuntu1.6
released
xenial
Fixed 2.2.0-10ubuntu2.6
released
trusty
dne