SUSE SLED15 / SLES15 Security Update : openjpeg (SUSE-SU-2022:1296-1)

high Nessus Plugin ID 160073

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:1296-1 advisory.

- Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). (CVE-2018-14423)

- An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact. (CVE-2018-16376)

- jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice. (CVE-2020-15389)

- A flaw was found in OpenJPEG's encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-27823)

- opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851. (CVE-2020-8112)

- Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option -ImgDir on a directory that contains 1048576 files. (CVE-2021-29338)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libopenjpeg1 and / or openjpeg-devel packages.

See Also

https://bugzilla.suse.com/1102016

https://bugzilla.suse.com/1106881

https://bugzilla.suse.com/1162090

https://bugzilla.suse.com/1173578

https://bugzilla.suse.com/1180457

https://bugzilla.suse.com/1184774

https://www.suse.com/security/cve/CVE-2018-14423

https://www.suse.com/security/cve/CVE-2018-16376

https://www.suse.com/security/cve/CVE-2020-15389

https://www.suse.com/security/cve/CVE-2020-27823

https://www.suse.com/security/cve/CVE-2020-8112

https://www.suse.com/security/cve/CVE-2021-29338

http://www.nessus.org/u?362923ae

Plugin Details

Severity: High

ID: 160073

File Name: suse_SU-2022-1296-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 4/22/2022

Updated: 7/13/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-8112

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libopenjpeg1, p-cpe:/a:novell:suse_linux:openjpeg-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/21/2022

Vulnerability Publication Date: 7/19/2018

Reference Information

CVE: CVE-2018-14423, CVE-2018-16376, CVE-2020-15389, CVE-2020-27823, CVE-2020-8112, CVE-2021-29338

SuSE: SUSE-SU-2022:1296-1