First published: Wed Dec 09 2020(Updated: )
A head-based buffer overflow exists in Academy Software Foundation OpenEXR 2.3.0 in writeTileData in ImfTiledOutputFile.cpp that can cause a denial of service via a crafted EXR file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openexr Openexr | =2.3.0 | |
Debian Debian Linux | =10.0 |
https://github.com/AcademySoftwareFoundation/openexr/commit/6bb36714528a9563dd3b92720c5063a1284b86f8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16589 is a head-based buffer overflow vulnerability in Academy Software Foundation OpenEXR 2.3.0.
CVE-2020-16589 can be exploited by creating a crafted EXR file and causing a denial of service.
CVE-2020-16589 has a severity rating of 5.5 which is considered medium.
OpenEXR 2.3.0 and Debian Linux 10.0 are affected by CVE-2020-16589.
To fix CVE-2020-16589, it is recommended to update to a patched version of OpenEXR and Debian Linux.