SUSE update for openexr



Published: 2021-12-01
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3933
CVE-2021-3941
CWE-ID CWE-190
CWE-369
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for Desktop Applications
Operating systems & Components / Operating system

openexr-devel
Operating systems & Components / Operating system package or component

openexr-debugsource
Operating systems & Components / Operating system package or component

openexr-debuginfo
Operating systems & Components / Operating system package or component

libIlmImfUtil-2_2-23-debuginfo
Operating systems & Components / Operating system package or component

libIlmImfUtil-2_2-23
Operating systems & Components / Operating system package or component

libIlmImf-2_2-23-debuginfo
Operating systems & Components / Operating system package or component

libIlmImf-2_2-23
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU70427

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3933

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow when processing files. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and perform a denial of service (DoS) attack.

Note, the vulnerability affects software installation on 32-bit systems.

Mitigation

Update the affected package openexr to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

openexr-devel: before 2.2.1-3.38.1

openexr-debugsource: before 2.2.1-3.38.1

openexr-debuginfo: before 2.2.1-3.38.1

libIlmImfUtil-2_2-23-debuginfo: before 2.2.1-3.38.1

libIlmImfUtil-2_2-23: before 2.2.1-3.38.1

libIlmImf-2_2-23-debuginfo: before 2.2.1-3.38.1

libIlmImf-2_2-23: before 2.2.1-3.38.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213844-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Division by zero

EUVDB-ID: #VU58233

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3941

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to divide-by-zero issue in Imf_3_1::RGBtoXYZ. A remote attacker can trick the victim to open a specially crafted file, trigger division by zero and crash the application.

Mitigation

Update the affected package openexr to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

openexr-devel: before 2.2.1-3.38.1

openexr-debugsource: before 2.2.1-3.38.1

openexr-debuginfo: before 2.2.1-3.38.1

libIlmImfUtil-2_2-23-debuginfo: before 2.2.1-3.38.1

libIlmImfUtil-2_2-23: before 2.2.1-3.38.1

libIlmImf-2_2-23-debuginfo: before 2.2.1-3.38.1

libIlmImf-2_2-23: before 2.2.1-3.38.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213844-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###