runfill_crash.exr file with the following command:exrcheck -m runfill_crash.exr
exrcheck crashes with ASAN stack-trace.An attacker may cause a denial of service by crashing the application.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| OpenEXR | pip | = 3.3.2 | 3.3.3 |
The vulnerability is a NULL pointer dereference in OpenEXR when processing deep scanline or deep tiled images in reduceMemory mode. The analysis of the patch between the vulnerable version (3.3.2) and the patched version (3.3.3) revealed that the commit a38dfe024e3011e69e6bd89ca16bfa4f1302eb3f addresses this issue. The patch modifies two functions, ScanLineProcess::run_fill and TileProcess::run_fill, by adding a null pointer check for the destination buffer (dest) before writing to it. The vulnerability description explicitly mentions ScanLineProcess::run_fill as the location of the crash. The patch confirms this and also reveals a similar vulnerability in TileProcess::run_fill. Therefore, both functions are identified as vulnerable.
KEV Misses 88% of Exploited CVEs- Get the report