Metrics
Affected Vendors & Products
Wed, 13 Aug 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 04 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openexr
Openexr openexr |
|
| Vendors & Products |
Openexr
Openexr openexr |
Fri, 01 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 31 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3. | |
| Title | OpenEXR's Forged Unpacked Size can Lead to Heap-Based Buffer Overflow in Deep Scanline Parsing | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-31T20:22:23.603Z
Reserved: 2025-05-15T16:06:40.941Z
Link: CVE-2025-48071
Updated: 2025-07-31T20:22:15.301Z
Status : Analyzed
Published: 2025-07-31T21:15:27.990
Modified: 2025-08-13T19:18:51.740
Link: CVE-2025-48071