// For flags

CVE-2021-3479

Gentoo Linux Security Advisory 202107-27

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.

Se presenta un fallo en la funcionalidad de la API Scanline de OpenEXR en versiones anteriores a 3.0.0-beta. Un atacante que pueda ser capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría desencadenar un consumo excesivo de la memoria, resultando en un impacto para la disponibilidad del sistema.

An update that fixes 5 vulnerabilities is now available. This update for openexr fixes the following issues. Fixed an integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers. Fixed an Integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers. Fixed a Null Pointer dereference in Imf_2_5:hufUncompress. Fixed a Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts. Fixed an Out-of-memory caused by allocation of a very large buffer. This update was imported from the SUSE:SLE-15:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-03-30 CVE Reserved
  • 2021-03-31 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openexr
Search vendor "Openexr"
Openexr
Search vendor "Openexr" for product "Openexr"
< 2.4.3
Search vendor "Openexr" for product "Openexr" and version " < 2.4.3"
-
Affected
Openexr
Search vendor "Openexr"
Openexr
Search vendor "Openexr" for product "Openexr"
>= 2.5.0 < 2.5.4
Search vendor "Openexr" for product "Openexr" and version " >= 2.5.0 < 2.5.4"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected