Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3478
HistoryMar 31, 2021 - 12:00 a.m.

CVE-2021-3478

2021-03-3100:00:00
ubuntu.com
ubuntu.com
11
openexr
scanline input
file functionality
system memory
excessive
system availability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.8%

There’s a flaw in OpenEXR’s scanline input file functionality in versions
before 3.0.0-beta. An attacker able to submit a crafted file to be
processed by OpenEXR could consume excessive system memory. The greatest
impact of this flaw is to system availability.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchopenexr< 2.2.0-11.1ubuntu1.6UNKNOWN
ubuntu20.04noarchopenexr< 2.3.0-6ubuntu0.5UNKNOWN
ubuntu20.10noarchopenexr< 2.5.3-2ubuntu0.2UNKNOWN
ubuntu16.04noarchopenexr< 2.2.0-10ubuntu2.6UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.8%