Lucene search

K
archlinuxArchLinuxASA-202107-14
HistoryJul 06, 2021 - 12:00 a.m.

[ASA-202107-14] openexr: arbitrary code execution

2021-07-0600:00:00
security.archlinux.org
177
openexr
arbitrary code execution
upgrade
version 3.0.5-1
heap-buffer overflow
permissions
exr image file

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.2%

Arch Linux Security Advisory ASA-202107-14

Severity: Medium
Date : 2021-07-06
CVE-ID : CVE-2021-3598
Package : openexr
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-2071

Summary

The package openexr before version 3.0.5-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 3.0.5-1.

pacman -Syu “openexr>=3.0.5-1”

The problem has been fixed upstream in version 3.0.5.

Workaround

None.

Description

A heap-buffer overflow was found in the readChars function of OpenEXR
before version 3.0.5. An attacker could use this flaw to execute
arbitrary code with the permissions of the user running the application
compiled against OpenEXR.

Impact

An attacker could execute arbitrary code through a crafted EXR image
file.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://github.com/AcademySoftwareFoundation/openexr/issues/1033
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://github.com/AcademySoftwareFoundation/openexr/commit/b054116e57ebf62739a17217f922359b174d1332
https://security.archlinux.org/CVE-2021-3598

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyopenexr< 3.0.5-1UNKNOWN

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.2%