SUSE SLED15 / SLES15 Security Update : openjpeg2 (SUSE-SU-2022:3802-1)

high Nessus Plugin ID 166688

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:3802-1 advisory.

- Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). (CVE-2018-20846)

- OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
(CVE-2018-21010)

- A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application. (CVE-2020-27814)

- A flaw was found in OpenJPEG's encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability. (CVE-2020-27824)

- There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability. (CVE-2020-27841)

- There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability. (CVE-2020-27842)

- A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system availability. (CVE-2020-27843)

- There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability. (CVE-2020-27845)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libopenjp2-7, openjpeg2 and / or openjpeg2-devel packages.

See Also

https://bugzilla.suse.com/1140205

https://bugzilla.suse.com/1149789

https://bugzilla.suse.com/1179594

https://bugzilla.suse.com/1179821

https://bugzilla.suse.com/1180042

https://bugzilla.suse.com/1180043

https://bugzilla.suse.com/1180044

https://bugzilla.suse.com/1180046

https://www.suse.com/security/cve/CVE-2018-20846

https://www.suse.com/security/cve/CVE-2018-21010

https://www.suse.com/security/cve/CVE-2020-27814

https://www.suse.com/security/cve/CVE-2020-27824

https://www.suse.com/security/cve/CVE-2020-27841

https://www.suse.com/security/cve/CVE-2020-27842

https://www.suse.com/security/cve/CVE-2020-27843

https://www.suse.com/security/cve/CVE-2020-27845

http://www.nessus.org/u?8766b837

Plugin Details

Severity: High

ID: 166688

File Name: suse_SU-2022-3802-1.nasl

Version: 1.8

Type: local

Agent: unix

Published: 10/28/2022

Updated: 7/13/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-27814

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2018-21010

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:openjpeg2, p-cpe:/a:novell:suse_linux:libopenjp2-7, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:openjpeg2-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/27/2022

Vulnerability Publication Date: 6/26/2019

Reference Information

CVE: CVE-2018-20846, CVE-2018-21010, CVE-2020-27814, CVE-2020-27824, CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845

SuSE: SUSE-SU-2022:3802-1