RHEL 8 : exiv2 (RHSA-2020:1577)

high Nessus Plugin ID 143032

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1577 advisory.

The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.

The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)

Security Fix(es):

* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)

* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)

* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)

* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)

* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)

* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)

* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)

* exiv2: information leak via a crafted file (CVE-2018-11037)

* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)

* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)

* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)

* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)

* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)

* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)

* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)

* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)

* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)

* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)

* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)

* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)

* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)

* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)

* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)

* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)

* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)

* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)

* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)

* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)

* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/errata/RHSA-2020:1577

https://bugzilla.redhat.com/show_bug.cgi?id=1531171

https://bugzilla.redhat.com/show_bug.cgi?id=1531724

https://bugzilla.redhat.com/show_bug.cgi?id=1566725

https://bugzilla.redhat.com/show_bug.cgi?id=1566731

https://bugzilla.redhat.com/show_bug.cgi?id=1566735

https://bugzilla.redhat.com/show_bug.cgi?id=1566737

https://bugzilla.redhat.com/show_bug.cgi?id=1579544

https://bugzilla.redhat.com/show_bug.cgi?id=1594627

https://bugzilla.redhat.com/show_bug.cgi?id=1609396

https://bugzilla.redhat.com/show_bug.cgi?id=1632481

https://bugzilla.redhat.com/show_bug.cgi?id=1632484

https://bugzilla.redhat.com/show_bug.cgi?id=1632490

https://bugzilla.redhat.com/show_bug.cgi?id=1635045

https://bugzilla.redhat.com/show_bug.cgi?id=1646555

https://bugzilla.redhat.com/show_bug.cgi?id=1649094

https://bugzilla.redhat.com/show_bug.cgi?id=1649101

https://bugzilla.redhat.com/show_bug.cgi?id=1651917

https://bugzilla.redhat.com/show_bug.cgi?id=1656187

https://bugzilla.redhat.com/show_bug.cgi?id=1656195

https://bugzilla.redhat.com/show_bug.cgi?id=1660423

https://bugzilla.redhat.com/show_bug.cgi?id=1660424

https://bugzilla.redhat.com/show_bug.cgi?id=1660425

https://bugzilla.redhat.com/show_bug.cgi?id=1660426

https://bugzilla.redhat.com/show_bug.cgi?id=1684381

https://bugzilla.redhat.com/show_bug.cgi?id=1728484

https://bugzilla.redhat.com/show_bug.cgi?id=1728488

https://bugzilla.redhat.com/show_bug.cgi?id=1728490

https://bugzilla.redhat.com/show_bug.cgi?id=1728492

https://bugzilla.redhat.com/show_bug.cgi?id=1728494

https://bugzilla.redhat.com/show_bug.cgi?id=1757444

https://bugzilla.redhat.com/show_bug.cgi?id=1757445

https://bugzilla.redhat.com/show_bug.cgi?id=1767748

https://bugzilla.redhat.com/show_bug.cgi?id=1800472

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?dd7b3f20

http://www.nessus.org/u?93bc37cd

Plugin Details

Severity: High

ID: 143032

File Name: redhat-RHSA-2020-1577.nasl

Version: 1.12

Type: local

Agent: unix

Published: 11/18/2020

Updated: 11/7/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-9143

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:exiv2-doc, p-cpe:/a:redhat:enterprise_linux:exiv2-devel, p-cpe:/a:redhat:enterprise_linux:exiv2-libs, p-cpe:/a:redhat:enterprise_linux:libgexiv2-devel, p-cpe:/a:redhat:enterprise_linux:gegl, p-cpe:/a:redhat:enterprise_linux:libgexiv2, p-cpe:/a:redhat:enterprise_linux:gnome-color-manager, p-cpe:/a:redhat:enterprise_linux:exiv2, cpe:/o:redhat:enterprise_linux:8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/28/2020

Vulnerability Publication Date: 12/31/2017

Reference Information

CVE: CVE-2017-18005, CVE-2018-10772, CVE-2018-11037, CVE-2018-14338, CVE-2018-17229, CVE-2018-17230, CVE-2018-17282, CVE-2018-17581, CVE-2018-18915, CVE-2018-19107, CVE-2018-19108, CVE-2018-19535, CVE-2018-19607, CVE-2018-20096, CVE-2018-20097, CVE-2018-20098, CVE-2018-20099, CVE-2018-4868, CVE-2018-9303, CVE-2018-9304, CVE-2018-9305, CVE-2018-9306, CVE-2019-13109, CVE-2019-13111, CVE-2019-13112, CVE-2019-13113, CVE-2019-13114, CVE-2019-20421, CVE-2019-9143

BID: 106003, 109292, 109287, 104607, 102477, 107161, 109279

CWE: 121, 122, 125, 200, 369, 400, 476, 617, 835

RHSA: 2020:1577