Vulnerability Details CVE-2021-3479
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.1%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 4.3
Products affected by CVE-2021-3479
-
cpe:2.3:a:openexr:openexr:-
-
cpe:2.3:a:openexr:openexr:1.0
-
cpe:2.3:a:openexr:openexr:1.0.1
-
cpe:2.3:a:openexr:openexr:1.0.2
-
cpe:2.3:a:openexr:openexr:1.0.3
-
cpe:2.3:a:openexr:openexr:1.0.4
-
cpe:2.3:a:openexr:openexr:1.0.5
-
cpe:2.3:a:openexr:openexr:1.0.6
-
cpe:2.3:a:openexr:openexr:1.0.7
-
cpe:2.3:a:openexr:openexr:1.1.0
-
cpe:2.3:a:openexr:openexr:1.1.1
-
cpe:2.3:a:openexr:openexr:1.2.1
-
cpe:2.3:a:openexr:openexr:1.2.2
-
cpe:2.3:a:openexr:openexr:1.3.0
-
cpe:2.3:a:openexr:openexr:1.3.1
-
cpe:2.3:a:openexr:openexr:1.3.2
-
cpe:2.3:a:openexr:openexr:1.4.0
-
cpe:2.3:a:openexr:openexr:1.5.0
-
cpe:2.3:a:openexr:openexr:1.6.0
-
cpe:2.3:a:openexr:openexr:1.6.1
-
cpe:2.3:a:openexr:openexr:1.7.0
-
cpe:2.3:a:openexr:openexr:1.7.1
-
cpe:2.3:a:openexr:openexr:2.0.0
-
cpe:2.3:a:openexr:openexr:2.0.1
-
cpe:2.3:a:openexr:openexr:2.1.0
-
cpe:2.3:a:openexr:openexr:2.2.0
-
cpe:2.3:a:openexr:openexr:2.2.1
-
cpe:2.3:a:openexr:openexr:2.2.2
-
cpe:2.3:a:openexr:openexr:2.3.0
-
cpe:2.3:a:openexr:openexr:2.4.0
-
cpe:2.3:a:openexr:openexr:2.4.1
-
cpe:2.3:a:openexr:openexr:2.4.2
-
cpe:2.3:a:openexr:openexr:2.5.0
-
cpe:2.3:a:openexr:openexr:2.5.1
-
cpe:2.3:a:openexr:openexr:2.5.2
-
cpe:2.3:a:openexr:openexr:2.5.3
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:9.0