First published: Mon Mar 15 2021(Updated: )
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openexr Openexr | <2.5.4 | |
Debian Debian Linux | =10.0 | |
redhat/OpenEXR | <3.0.0 | 3.0.0 |
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20299 is a vulnerability found in OpenEXR's Multipart input file functionality that can trigger a NULL pointer dereference and lead to system availability issues.
The severity of CVE-2021-20299 is high, with a severity value of 7.5.
OpenEXR versions up to and excluding 2.5.4, Debian Linux version 10.0, and Red Hat OpenEXR version up to and excluding 3.0.0 are affected by CVE-2021-20299.
CVE-2021-20299 can be exploited by using a crafted multi-part input file with no actual parts.
To fix CVE-2021-20299, update to OpenEXR version 2.5.4 or later, Debian Linux version 10.0 or later, or Red Hat OpenEXR version 3.0.0 or later.