There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
{ "vanir_signatures": [ { "source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5", "target": { "file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp", "function": "ScanLineInputFile::initialize" }, "signature_type": "Function", "deprecated": false, "signature_version": "v1", "id": "CVE-2021-3477-3b14fd36", "digest": { "length": 1690.0, "function_hash": "147499493693564905582259429661292444797" } }, { "source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5", "target": { "file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp" }, "signature_type": "Line", "deprecated": false, "signature_version": "v1", "id": "CVE-2021-3477-bea1d206", "digest": { "threshold": 0.9, "line_hashes": [ "183799983013183831380237481661086301550", "111519733374137260985206676436366582935", "338562742485568351177658719788975857619", "84570287594119879542064273017314287589", "152453817114836365619507449973532304004", "152126518450649847430180110668365421093", "334371091860315902789981231789629231501" ] } } ] }