Unrated severityNVD Advisory· Published Mar 31, 2021· Updated Aug 3, 2024
CVE-2021-3479
CVE-2021-3479
Description
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- security.gentoo.org/glsa/202107-27mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2021/07/msg00001.htmlmitremailing-list
- lists.debian.org/debian-lts-announce/2022/12/msg00022.htmlmitremailing-list
- bugs.chromium.org/p/oss-fuzz/issues/detailmitre
- bugzilla.redhat.com/show_bug.cgimitre
News mentions
0No linked articles in our index yet.