SUSE SLED15 / SLES15 Security Update : exiv2 (SUSE-SU-2022:4276-1)

critical Nessus Plugin ID 168309

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4276-1 advisory.

- There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (CVE-2017-11591)

- Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp. (CVE-2018-11531)

- CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service. (CVE-2018-17581)

- There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)

- There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20098)

- There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20099)

- An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
(CVE-2019-13109)

- A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)

- Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)

- Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.
An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)

- Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.
(CVE-2021-32815)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libexiv2-26 and / or libexiv2-devel packages.

See Also

https://bugzilla.suse.com/1050257

https://bugzilla.suse.com/1095070

https://bugzilla.suse.com/1110282

https://bugzilla.suse.com/1119559

https://bugzilla.suse.com/1119560

https://bugzilla.suse.com/1119562

https://bugzilla.suse.com/1142677

https://bugzilla.suse.com/1142678

https://bugzilla.suse.com/1153577

https://bugzilla.suse.com/1186231

https://bugzilla.suse.com/1189337

https://www.suse.com/security/cve/CVE-2017-11591

https://www.suse.com/security/cve/CVE-2018-11531

https://www.suse.com/security/cve/CVE-2018-17581

https://www.suse.com/security/cve/CVE-2018-20097

https://www.suse.com/security/cve/CVE-2018-20098

https://www.suse.com/security/cve/CVE-2018-20099

https://www.suse.com/security/cve/CVE-2019-13109

https://www.suse.com/security/cve/CVE-2019-13110

https://www.suse.com/security/cve/CVE-2019-17402

https://www.suse.com/security/cve/CVE-2021-29473

https://www.suse.com/security/cve/CVE-2021-32815

http://www.nessus.org/u?f51feb96

Plugin Details

Severity: Critical

ID: 168309

File Name: suse_SU-2022-4276-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 11/30/2022

Updated: 7/14/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-11531

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libexiv2-devel, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:libexiv2-26

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/29/2022

Vulnerability Publication Date: 7/24/2017

Reference Information

CVE: CVE-2017-11591, CVE-2018-11531, CVE-2018-17581, CVE-2018-20097, CVE-2018-20098, CVE-2018-20099, CVE-2019-13109, CVE-2019-13110, CVE-2019-17402, CVE-2021-29473, CVE-2021-32815

SuSE: SUSE-SU-2022:4276-1