ID CVE-2021-23169
Summary A heap-buffer overflow was found in the copyIntoFrameBuffer function of OpenEXR in versions before 3.0.1. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR.
References
Vulnerable Configurations
  • cpe:2.3:a:openexr:openexr:-:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:-:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.4.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.4.0:alpha:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.7:-:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.7:-:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:2.5.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:2.5.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:openexr:openexr:3.0.0:beta:*:*:*:*:*:*
    cpe:2.3:a:openexr:openexr:3.0.0:beta:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 07-12-2022 - 01:25)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
Last major update 07-12-2022 - 01:25
Published 08-06-2021 - 12:15
Last modified 07-12-2022 - 01:25
Back to Top