CVE-2021-3479
Gentoo Linux Security Advisory 202107-27
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Se presenta un fallo en la funcionalidad de la API Scanline de OpenEXR en versiones anteriores a 3.0.0-beta. Un atacante que pueda ser capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría desencadenar un consumo excesivo de la memoria, resultando en un impacto para la disponibilidad del sistema.
Multiple vulnerabilities have been found in OpenEXR, the worst of which could result in the arbitrary execution of code. Versions less than 2.5.6 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-30 CVE Reserved
- 2021-03-31 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1939149 | 2022-12-13 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202107-27 | 2022-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openexr Search vendor "Openexr" | Openexr Search vendor "Openexr" for product "Openexr" | < 2.4.3 Search vendor "Openexr" for product "Openexr" and version " < 2.4.3" | - |
Affected
| ||||||
Openexr Search vendor "Openexr" | Openexr Search vendor "Openexr" for product "Openexr" | >= 2.5.0 < 2.5.4 Search vendor "Openexr" for product "Openexr" and version " >= 2.5.0 < 2.5.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|