{"id":"CVE-2021-3477","details":"There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.","modified":"2026-04-16T04:35:07.699272194Z","published":"2021-03-31T14:15:21.047Z","related":["SUSE-SU-2021:1489-1","SUSE-SU-2021:3843-1","openSUSE-SU-2021:0670-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-27"},{"type":"REPORT","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1939159"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openexr/openexr","events":[{"introduced":"0"},{"fixed":"7bab6d44caf65ee3cabe31553f8e2968c8747be5"},{"introduced":"ed64d5467dee9763f28baf300f7699e6288b9f5f"},{"fixed":"1899a456cbafb213c4a53c35eb3203296f92e503"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.3"},{"introduced":"2.5.0"},{"fixed":"2.5.4"}]}}],"versions":["OPENEXR_1_0_4","v1.7.1","v2.0.0","v2.0.0.GM","v2.0.1","v2.1.0","v2.3.0","v2.4.0","v2.4.0-beta.1","v2.4.1","v2.4.2","v2.5.0","v2.5.1","v2.5.2","v2.5.3"],"database_specific":{"vanir_signatures":[{"target":{"function":"ScanLineInputFile::initialize","file":"OpenEXR/IlmImf/ImfScanLineInputFile.cpp"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"147499493693564905582259429661292444797","length":1690},"id":"CVE-2021-3477-3b14fd36","source":"https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5","deprecated":false},{"target":{"file":"OpenEXR/IlmImf/ImfScanLineInputFile.cpp"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["183799983013183831380237481661086301550","111519733374137260985206676436366582935","338562742485568351177658719788975857619","84570287594119879542064273017314287589","152453817114836365619507449973532304004","152126518450649847430180110668365421093","334371091860315902789981231789629231501"]},"id":"CVE-2021-3477-bea1d206","source":"https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5","deprecated":false}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3477.json","vanir_signatures_modified":"2026-04-11T17:26:04Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}