Metrics
Affected Vendors & Products
Wed, 13 Aug 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 04 Aug 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openexr
Openexr openexr |
|
Vendors & Products |
Openexr
Openexr openexr |
Fri, 01 Aug 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 31 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3. | |
Title | OpenEXR's Forged Unpacked Size can Lead to Heap-Based Buffer Overflow in Deep Scanline Parsing | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-31T20:13:14.436Z
Updated: 2025-07-31T20:22:23.603Z
Reserved: 2025-05-15T16:06:40.941Z
Link: CVE-2025-48071

Updated: 2025-07-31T20:22:15.301Z

Status : Analyzed
Published: 2025-07-31T21:15:27.990
Modified: 2025-08-13T19:18:51.740
Link: CVE-2025-48071
