CVE-2021-3933

EUVD-2021-27147
An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
Affected Products (NVD)
VendorProductVersion
openexropenexr
𝑥
< 3.1.2
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bookworm
3.1.5-5
fixed
bullseye
2.5.4-2+deb11u1
fixed
bullseye (security)
2.5.4-2+deb11u1
fixed
sid
3.1.5-5.1
fixed
stretch
not-affected
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ilmbase
bionic
not-affected
focal
needs-triage
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
dne
noble
dne
trusty
ignored
xenial
not-affected
openexr
bionic
Fixed 2.2.0-11.1ubuntu1.8
released
focal
Fixed 2.3.0-6ubuntu0.5+esm1
released
hirsute
ignored
impish
ignored
jammy
Fixed 2.5.7-1ubuntu0.1~esm1
released
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
ignored
xenial
Fixed 2.2.0-10ubuntu2.6+esm2
released
povray
bionic
needs-triage
focal
needs-triage
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
ignored
xenial
needs-triage