There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2701-1 openexr security update
Debian DLA Debian DLA DLA-3236-1 openexr security update
EUVD EUVD EUVD-2021-26800 There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
Ubuntu USN Ubuntu USN USN-4900-1 OpenEXR vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T16:53:17.620Z

Reserved: 2021-03-30T00:00:00

Link: CVE-2021-3478

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-31T14:15:21.127

Modified: 2024-11-21T06:21:38.417

Link: CVE-2021-3478

cve-icon Redhat

Severity : Low

Publid Date: 2021-02-15T00:00:00Z

Links: CVE-2021-3478 - Bugzilla

cve-icon OpenCVE Enrichment

No data.