SUSE update for exiv2



Published: 2022-11-30
Risk Medium
Patch available YES
Number of vulnerabilities 11
CVE-ID CVE-2017-11591
CVE-2018-11531
CVE-2018-17581
CVE-2018-20097
CVE-2018-20098
CVE-2018-20099
CVE-2019-13109
CVE-2019-13110
CVE-2019-17402
CVE-2021-29473
CVE-2021-32815
CWE-ID CWE-248
CWE-122
CWE-400
CWE-119
CWE-125
CWE-835
CWE-190
CWE-617
Exploitation vector Network
Public exploit Public exploit code for vulnerability #8 is available.
Vulnerable software
Subscribe
SUSE Enterprise Storage
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

SUSE CaaS Platform
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Desktop Applications
Operating systems & Components / Operating system

libexiv2-26-32bit-debuginfo
Operating systems & Components / Operating system package or component

libexiv2-26-32bit
Operating systems & Components / Operating system package or component

exiv2-lang
Operating systems & Components / Operating system package or component

libexiv2-doc
Operating systems & Components / Operating system package or component

libexiv2-devel
Operating systems & Components / Operating system package or component

libexiv2-26-debuginfo
Operating systems & Components / Operating system package or component

libexiv2-26
Operating systems & Components / Operating system package or component

exiv2-debugsource
Operating systems & Components / Operating system package or component

exiv2-debuginfo
Operating systems & Components / Operating system package or component

exiv2
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 11 vulnerabilities.

1) Uncaught Exception

EUVDB-ID: #VU69760

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-11591

CWE-ID: CWE-248 - Uncaught Exception

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a floating point exception in the Exiv2::ValueType function in Exiv2. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU13576

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11531

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer overflow in getData in preview.cpp. A remote attacker can trigger memory corruption and perform a denial of service attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource exhaustion

EUVDB-ID: #VU69761

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17581

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources caused by excessive stack consumption due to a recursive function within the CiffDirectory::readDirectory() function in crwimage_int.cpp. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU36299

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-20097

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU36300

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-20098

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Infinite loop

EUVDB-ID: #VU36301

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-20099

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

EUVDB-ID: #VU19510

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13109

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in Exiv2 through 0.27.1 due to PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. A remote attacker can create a crafted PNG image file, trigger integer overflow and perform denial of service (DoS) attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Integer overflow

EUVDB-ID: #VU20305

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-13110

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to integer overflow in CiffDirectory::readDirectory() function. A remote attacker can create a specially crafted CRW image, pass it to the application, trigger integer overflow and crash the affected application.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

9) Buffer overflow

EUVDB-ID: #VU28797

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17402

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary in Exiv2::getULong() function in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp. A remote attacker can pass specially crafted data to the application, trigger memory corruption and crash the service.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds read

EUVDB-ID: #VU55921

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-29473

CWE-ID: N/A

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when processing Exif, IPTC, XMP and ICC image metadata. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Reachable Assertion

EUVDB-ID: #VU69648

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32815

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when handling metadata of image files. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package exiv2 to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 6 - 7.1

SUSE Manager Retail Branch Server: 4.1 - 4.2

SUSE Manager Server: 4.1 - 4.2

SUSE Manager Proxy: 4.1 - 4.2

SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2

SUSE Linux Enterprise Server: 15-LTSS - 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.3

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP3

libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1

libexiv2-26-32bit: before 0.26-150000.6.26.1

exiv2-lang: before 0.26-150000.6.26.1

libexiv2-doc: before 0.26-150000.6.26.1

libexiv2-devel: before 0.26-150000.6.26.1

libexiv2-26-debuginfo: before 0.26-150000.6.26.1

libexiv2-26: before 0.26-150000.6.26.1

exiv2-debugsource: before 0.26-150000.6.26.1

exiv2-debuginfo: before 0.26-150000.6.26.1

exiv2: before 0.26-150000.6.26.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###