Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <tencent_91300EF1F4508712395C10A9DF9431CDFC08@qq.com>
Date: Mon, 9 Oct 2017 15:52:06 +0800
From: "NOIRFATE" <noirfate@....qq.com>
To: "oss-security" <oss-security@...ts.openwall.com>
Subject:  OpenEXR : CVE-2017-14988 : DOS in Header::readfrom

Description:
The Header::readfrom function may allocate any size of memory specified by user via a crafted exr image file, and cause DOS.

Affected version:
openexr 2.2.0

Fixed version:
No upstream fix available

Details:
https://github.com/openexr/openexr/issues/248

Credit:
This bug was discovered by Yihan Lian of GearTeam at Qihoo360

CVE:
CVE-2017-14988

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.