CVE-2021-3933

An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
VendorProductVersion
openexropenexr
𝑥
< 3.1.2
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bullseye (security)
2.5.4-2+deb11u1
fixed
bullseye
2.5.4-2+deb11u1
fixed
stretch
not-affected
bookworm
3.1.5-5
fixed
sid
3.1.5-5.1
fixed
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ilmbase
noble
dne
mantic
dne
lunar
dne
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
focal
needs-triage
bionic
not-affected
xenial
not-affected
trusty
ignored
openexr
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
Fixed 2.5.7-1ubuntu0.1~esm1
released
impish
ignored
hirsute
ignored
focal
Fixed 2.3.0-6ubuntu0.5+esm1
released
bionic
Fixed 2.2.0-11.1ubuntu1.8
released
xenial
Fixed 2.2.0-10ubuntu2.6+esm2
released
trusty
ignored
povray
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored