First published: Fri Jul 31 2009(Updated: )
Heap-based buffer overflow in the compression implementation in OpenEXR 1.2.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEXR | =1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1722 has a high severity level due to potential denial of service and arbitrary code execution.
To fix CVE-2009-1722, update OpenEXR to a version that addresses this vulnerability.
The potential impacts of CVE-2009-1722 include application crashes and the execution of arbitrary code.
CVE-2009-1722 specifically affects OpenEXR version 1.2.2.
CVE-2009-1722 can be exploited by context-dependent attackers who can leverage the vulnerability through specific vectors.