First published: Thu Feb 01 2024(Updated: )
Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability.
Credit: cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/OpenEXR | <3.2.1 | 3.2.1 |
OpenEXR | <=3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5841 has been classified as a medium severity vulnerability due to the risk of a heap-based buffer overflow.
To mitigate CVE-2023-5841, upgrade OpenEXR to version 3.2.2 or later.
CVE-2023-5841 affects OpenEXR versions up to and including 3.2.1.
CVE-2023-5841 is a heap-based buffer overflow vulnerability.
Exploitation of CVE-2023-5841 could lead to arbitrary code execution and destabilization of the affected application.