ID CVE-2021-20296
Summary A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
References
Vulnerable Configurations
  • cpe:2.3:a:openexr:openexr:-:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:-:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.4.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.4.0:alpha:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 13-12-2022 - 01:56)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
Last major update 13-12-2022 - 01:56
Published 01-04-2021 - 14:15
Last modified 13-12-2022 - 01:56
Back to Top