There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
{ "vanir_signatures": [ { "source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5", "target": { "file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp", "function": "ScanLineInputFile::initialize" }, "signature_type": "Function", "id": "CVE-2021-3478-3b14fd36", "signature_version": "v1", "deprecated": false, "digest": { "length": 1690.0, "function_hash": "147499493693564905582259429661292444797" } }, { "source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5", "target": { "file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp" }, "signature_type": "Line", "id": "CVE-2021-3478-bea1d206", "signature_version": "v1", "deprecated": false, "digest": { "threshold": 0.9, "line_hashes": [ "183799983013183831380237481661086301550", "111519733374137260985206676436366582935", "338562742485568351177658719788975857619", "84570287594119879542064273017314287589", "152453817114836365619507449973532304004", "152126518450649847430180110668365421093", "334371091860315902789981231789629231501" ] } } ] }