CVE-2009-1721 (CNNVD-200907-447)
MEDIUM
中文标题:
OpenEXR 程序Imf::hufUncompress解压功能 拒绝服务攻击和代码执行漏洞
英文标题:
The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allow...
CVSS分数:
6.8
发布时间:
2009-07-31 18:29:00
漏洞类型:
配置错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
OpenEXR 程序Imf::hufUncompress解压功能 存在拒绝服务攻击和代码执行漏洞,远程攻击者通过触发释放未初始化指针的向量导致拒绝服务攻击,或执行任意代码。
英文描述:
The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
CWE类型:
CWE-824
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| openexr | openexr | 1.2.2 | - | - |
cpe:2.3:a:openexr:openexr:1.2.2:*:*:*:*:*:*:*
|
| openexr | openexr | 1.6.1 | - | - |
cpe:2.3:a:openexr:openexr:1.6.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 10.0 | - | - |
cpe:2.3:o:opensuse:opensuse:10.0:*:*:*:*:*:*:*
|
| opensuse | opensuse | 10.3 | - | - |
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.0 | - | - |
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 4.0 | - | - |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 10 | - | - |
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 11 | - | - |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
FEDORA-2009-8132
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
36123
third-party-advisory
cve.org
访问
cve.org
FEDORA-2009-8136
vendor-advisory
cve.org
访问
cve.org
MDVSA-2009:191
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
36753
third-party-advisory
cve.org
访问
cve.org
ADV-2009-2035
vdb-entry
cve.org
访问
cve.org
36096
third-party-advisory
cve.org
访问
cve.org
DSA-1842
vendor-advisory
cve.org
访问
cve.org
MDVSA-2009:190
vendor-advisory
cve.org
访问
cve.org
36030
third-party-advisory
cve.org
访问
cve.org
36032
third-party-advisory
cve.org
访问
cve.org
APPLE-SA-2009-08-05-1
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
35838
vdb-entry
cve.org
访问
cve.org
1022674
vdb-entry
cve.org
访问
cve.org
USN-831-1
vendor-advisory
cve.org
访问
cve.org
ADV-2009-2172
vdb-entry
cve.org
访问
cve.org
TA09-218A
third-party-advisory
cve.org
访问
cve.org
SUSE-SR:2009:014
vendor-advisory
cve.org
访问
cve.org
CVSS评分详情
6.8
MEDIUM
CVSS向量:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2009-07-31 18:29:00
修改时间:
2024-08-07 05:20:35
创建时间:
2025-11-11 15:33:01
更新时间:
2025-11-11 15:49:37
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2009-1721 |
2025-11-11 15:18:10 | 2025-11-11 07:33:01 |
| NVD | nvd_CVE-2009-1721 |
2025-11-11 14:53:00 | 2025-11-11 07:41:48 |
| CNNVD | cnnvd_CNNVD-200907-447 |
2025-11-11 15:09:06 | 2025-11-11 07:49:37 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:37
vulnerability_type: 未提取 → 配置错误; cnnvd_id: 未提取 → CNNVD-200907-447; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 配置错误
- cnnvd_id: 未提取 -> CNNVD-200907-447
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:48
cvss_score: 未提取 → 6.8; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 13; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 13
- data_sources: ['cve'] -> ['cve', 'nvd']