First published: Fri Jun 11 2021(Updated: )
A heap-buffer overflow was found in the rleUncompress function of OpenEXR in versions before 3.0.3. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR. References: <a href="https://github.com/AcademySoftwareFoundation/openexr/pull/1036">https://github.com/AcademySoftwareFoundation/openexr/pull/1036</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openexr | <=2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 2.5.4-2+deb11u1 3.1.5-5 3.1.5-5.1 |
Openexr Openexr | <3.0.5 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/OpenEXR | <3.0.5 | 3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3605 is a vulnerability in OpenEXR's rleUncompress functionality that could cause an out-of-bounds read.
The severity of CVE-2021-3605 is high with a severity value of 5.5.
OpenEXR versions prior to 3.0.5, Redhat Enterprise Linux 8.0, Debian Linux 10.0 and 11.0 are affected by CVE-2021-3605.
An attacker can exploit CVE-2021-3605 by submitting a crafted file to an application linked with OpenEXR.
The greatest risk from CVE-2021-3605 is to application availability.