Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31047: n/a

0
Low
VulnerabilityCVE-2024-31047cvecve-2024-31047
Published: Mon Apr 08 2024 (04/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:42:49 UTC

Technical Analysis

CVE-2024-31047 identifies a vulnerability in the OpenEXR library maintained by the Academy Software Foundation, specifically affecting versions 3.2.3 and earlier. The flaw exists in the convert function within the exrmultipart.cpp source file, which is part of the multipart image handling functionality. This vulnerability allows a local attacker with low privileges to trigger a denial of service condition, likely through an integer overflow or related memory handling error (CWE-190). The attacker can cause the application or service using OpenEXR to crash or become unresponsive, impacting availability. The vulnerability does not affect confidentiality or integrity, and exploitation does not require user interaction. The CVSS 3.1 base score is 3.3, reflecting low severity due to the local attack vector and limited impact. No public exploits or patches have been reported at this time, but the vulnerability has been officially published and reserved in the CVE database. OpenEXR is widely used in the media and entertainment industry for high dynamic range image processing, so affected systems are typically those handling image data locally. The vulnerability highlights the need for careful input validation and memory management in image processing libraries.

Potential Impact

The primary impact of CVE-2024-31047 is a denial of service condition caused by a local attacker exploiting the convert function in OpenEXR. This can lead to application crashes or service interruptions, potentially disrupting workflows in environments relying on OpenEXR for image processing. Since the vulnerability requires local access with low privileges, remote exploitation is not feasible, limiting the attack surface. The lack of impact on confidentiality and integrity means sensitive data exposure or modification is not a concern. However, availability disruptions can affect production pipelines, especially in media, animation, and visual effects studios that use OpenEXR extensively. Organizations with automated image processing tasks or rendering farms could experience downtime or degraded performance. Although no known exploits exist in the wild, the vulnerability could be leveraged by insiders or attackers who have gained local access. Overall, the impact is limited but relevant for maintaining operational continuity in affected environments.

Mitigation Recommendations

To mitigate CVE-2024-31047, organizations should first monitor for official patches or updates from the Academy Software Foundation and apply them promptly once available. In the absence of patches, restricting local access to systems running OpenEXR can reduce the risk of exploitation. Implement strict access controls and user privilege management to prevent unauthorized local users from executing potentially malicious operations. Additionally, consider sandboxing or containerizing applications that use OpenEXR to limit the impact of a crash. Review and enhance input validation and error handling in any custom code interfacing with OpenEXR to avoid triggering the vulnerable convert function with malformed data. Regularly audit and monitor system logs for unusual crashes or behavior related to image processing tasks. Finally, maintain up-to-date backups and incident response plans to quickly recover from any denial of service incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd2b7ef31ef0b58ed9c

Added to database: 2/25/2026, 9:46:58 PM

Last enriched: 2/26/2026, 4:42:49 PM

Last updated: 4/12/2026, 6:21:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses