CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
75.6%
The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
Vendor | Product | Version | CPE |
---|---|---|---|
openexr | openexr | 1.2.2 | cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:* |
openexr | openexr | 1.6.1 | cpe:2.3:a:openexr:openexr:1.6.1:*:*:*:*:*:*:* |
opensuse | opensuse | 10.0 | cpe:2.3:o:opensuse:opensuse:10.0:*:*:*:*:*:*:* |
opensuse | opensuse | 10.3 | cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:* |
opensuse | opensuse | 11.0 | cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* |
apple | mac_os_x | * | cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
debian | debian_linux | 5.0 | cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 8.04 | cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 8.10 | cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html
release.debian.org/proposed-updates/stable_diffs/openexr_1.6.1-3%2Blenny3.debdiff
secunia.com/advisories/36030
secunia.com/advisories/36032
secunia.com/advisories/36096
secunia.com/advisories/36123
secunia.com/advisories/36753
security.debian.org/pool/updates/main/o/openexr/openexr_1.2.2-4.3+etch2.diff.gz
security.debian.org/pool/updates/main/o/openexr/openexr_1.6.1-3+lenny3.diff.gz
support.apple.com/kb/HT3757
www.debian.org/security/2009/dsa-1842
www.mandriva.com/security/advisories?name=MDVSA-2009:190
www.mandriva.com/security/advisories?name=MDVSA-2009:191
www.securityfocus.com/bid/35838
www.securitytracker.com/id?1022674
www.ubuntu.com/usn/USN-831-1
www.us-cert.gov/cas/techalerts/TA09-218A.html
www.vupen.com/english/advisories/2009/2035
www.vupen.com/english/advisories/2009/2172
www.redhat.com/archives/fedora-package-announce/2009-July/msg01286.html
www.redhat.com/archives/fedora-package-announce/2009-July/msg01290.html