There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1970987 | Exploit Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/202210-31 | Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5299 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=1970987 | Exploit Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/202210-31 | Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5299 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1970987 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html - Mailing List, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202210-31 - Third Party Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5299 - Third Party Advisory |
07 Nov 2023, 03:38
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
Information
Published : 2021-07-06 15:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3598
Mitre link : CVE-2021-3598
CVE.ORG link : CVE-2021-3598
JSON object : View
Products Affected
redhat
- enterprise_linux
debian
- debian_linux
openexr
- openexr
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
