Description
Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
References (6)
Core 6
Core References
Exploit, Third Party Advisory
https://takeonme.org/cves/CVE-2023-5841.html
Mailing List
http://seclists.org/fulldisclosure/2024/Sep/32
Mailing List
http://seclists.org/fulldisclosure/2024/Sep/34
Mailing List
http://seclists.org/fulldisclosure/2024/Sep/36
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/LSB6DB5LAKGPLRXEF5HDNGUMT7GIFT2C/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMINVKQLSUHECXBSQMZFCSDRIHFOJJI/
Scores
CVSS v3
9.1
EPSS
0.0080
EPSS Percentile
74.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (1)
openexr/openexr
< 3.2.1
Published
Feb 01, 2024
Tracked Since
Feb 18, 2026