
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in OpenEXR's hufUncompress functionality located in OpenEXR/IlmImf/ImfHuf.cpp. The vulnerability, identified as CVE-2021-20300, allows an attacker who can submit a crafted file to trigger an integer overflow when processed by OpenEXR (Debian Tracker).
The vulnerability occurs in the hufUncompress function where nBits+7 could overflow in the calculation of if ( ptr + (nBits+7)/8 > compressed+nCompressed). This integer overflow condition arises when nBits is too large. The issue was addressed by casting to a 64-bit type to prevent the overflow (Red Hat Bugzilla).
The primary impact of this vulnerability is to system availability. If successfully exploited, it could lead to application crashes when processing specially crafted files (Debian Tracker).
The vulnerability was fixed in multiple versions across different distributions. For Debian 10 (buster), it was addressed in version 2.2.1-4.1+deb10u2. The fix was also included in OpenEXR 3.0.0-beta. The patch involves modifying the calculation to use 64-bit integers to prevent the overflow condition (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."