Page 4 of 49 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. Se ha encontrado un desbordamiento de enteros que conlleva un desbordamiento del búfer de la pila en el DwaCompressor de OpenEXR en versiones anteriores a 3.0.1. Un atacante podría usar este fallo para bloquear una aplicación compilada con OpenEXR • https://bugzilla.redhat.com/show_bug.cgi?id=1947586 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K https://www.debian.org/security/2022/dsa-5299 • CWE-190: Integer Overflow or Wraparound CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability. Se encontró un fallo en OpenEXR en versiones anteriores a 3.0.0-beta. Un archivo de entrada diseñado proporcionado por un atacante, que es procesado por la funcionalidad de decompresión Dwa de la biblioteca IlmImf de OpenEXR, podría causar una desreferencia del puntero NULL. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854 https://bugzilla.redhat.com/show_bug.cgi?id=1939141 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html https://security.gentoo.org/glsa/202107-27 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability. Se presenta un fallo en los cálculos de tamaño de la muestra de mosaicos profundos de OpenEXR versiones anteriores a la 3.0.0-beta. Un atacante que pueda ser capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría desencadenar un desbordamiento de enteros, posteriormente conllevando a una lectura fuera de límites. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956 https://bugzilla.redhat.com/show_bug.cgi?id=1939159 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html https://security.gentoo.org/glsa/202107-27 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability. Se presenta un fallo en la funcionalidad scanline input file de OpenEXR en versiones anteriores a 3.0.0-beta. Un atacante capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría consumir una cantidad excesiva de la memoria del sistema. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409 https://bugzilla.redhat.com/show_bug.cgi?id=1939160 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html https://security.gentoo.org/glsa/202107-27 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability. Se presenta un fallo en la funcionalidad de la API Scanline de OpenEXR en versiones anteriores a 3.0.0-beta. Un atacante que pueda ser capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría desencadenar un consumo excesivo de la memoria, resultando en un impacto para la disponibilidad del sistema. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370 https://bugzilla.redhat.com/show_bug.cgi?id=1939149 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html https://security.gentoo.org/glsa/202107-27 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •