Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.
{"id": "CVE-2021-29458", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-29458", "description": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.", "published": "2021-04-19T19:15:00", "modified": "2023-11-07T03:32:00", "epss": [{"cve": "CVE-2021-29458", "epss": 0.00091, "percentile": 0.38471, "modified": "2023-12-06"}], "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29458", "reporter": "security-advisories@github.com", "references": ["https://github.com/Exiv2/exiv2/pull/1536", "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5", "https://github.com/Exiv2/exiv2/issues/1530", "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/"], "cvelist": ["CVE-2021-29458"], "immutableFields": [], "lastseen": "2023-12-06T15:01:52", "viewCount": 131, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:4173"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-29458"]}, {"type": "archlinux", "idList": ["ASA-202106-54"]}, {"type": "cbl_mariner", "idList": ["CBLMARINER:7207"]}, {"type": "debian", "idList": ["DEBIAN:DLA-3265-1:5DB83"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-29458"]}, {"type": "fedora", "idList": ["FEDORA:22782304C684", "FEDORA:C905730E433E"]}, {"type": "freebsd", "idList": ["D49F86AB-D9C7-11EB-A200-00155D01F201"]}, {"type": "mageia", "idList": ["MGASA-2021-0240"]}, {"type": "nessus", "idList": ["ALMA_LINUX_ALSA-2021-4173.NASL", "CENTOS8_RHSA-2021-4173.NASL", "DEBIAN_DLA-3265.NASL", "EULEROS_SA-2021-2293.NASL", "EULEROS_SA-2021-2327.NASL", "EULEROS_SA-2021-2367.NASL", "EULEROS_SA-2021-2579.NASL", "FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "NEWSTART_CGSL_NS-SA-2022-0090_EXIV2.NASL", "REDHAT-RHSA-2021-4173.NASL", "ROCKY_LINUX_RLSA-2021-4173.NASL", "UBUNTU_USN-4941-1.NASL"]}, {"type": "osv", "idList": ["OSV:DLA-3265-1"]}, {"type": "prion", "idList": ["PRION:CVE-2021-29458"]}, {"type": "redhat", "idList": ["RHSA-2021:4173"]}, {"type": "redhatcve", "idList": ["RH:CVE-2021-29458"]}, {"type": "rocky", "idList": ["RLSA-2021:4173"]}, {"type": "ubuntu", "idList": ["USN-4941-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-29458", "UB:CVE-2021-31292"]}, {"type": "veracode", "idList": ["VERACODE:30364"]}]}, "score": {"value": 5.8, "uncertanity": 0.3, "vector": "NONE"}, "twitter": {"counter": 11, "tweets": [{"link": "https://twitter.com/threatintelctr/status/1393710382741704710", "text": " NEW: CVE-2021-29458 Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earli... (click for more) Severity: MEDIUM https://t.co/xWetteOmTR?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1386781016732352514", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-29458 (exiv2)) has been published on https://t.co/2DdePtI8kj?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1386781016732352514", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-29458 (exiv2)) has been published on https://t.co/2DdePtI8kj?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1386781039327072264", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-29458 (exiv2)) has been published on https://t.co/9ZCEpDSouu?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1386781039327072264", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-29458 (exiv2)) has been published on https://t.co/9ZCEpDSouu?amp=1"}, {"link": "https://twitter.com/vigilance_en/status/1389552657308786690", "text": "Vigil@nce /hashtag/Vulnerability?src=hashtag_click of exiv2: five vulnerabilities. https://t.co/LPFarGxnLE?amp=1 Identifiers: /hashtag/CVE?src=hashtag_click-2021-29457, /hashtag/CVE?src=hashtag_click-2021-29458, /hashtag/CVE?src=hashtag_click-2021-29470. /hashtag/watch?src=hashtag_click"}, {"link": "https://twitter.com/threatintelctr/status/1393838732399235075", "text": " NEW: CVE-2021-29458 Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earli... (click for more) Severity: MEDIUM https://t.co/xWetteOmTR?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1389422321224536064", "text": " NEW: CVE-2021-29458 Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earli... (click for more) Severity: MEDIUM https://t.co/xWetteOmTR?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1393884064235474947", "text": " NEW: CVE-2021-29458 Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earli... (click for more) Severity: MEDIUM https://t.co/xWettewLvh?amp=1"}, {"link": "https://twitter.com/VulmonFeeds/status/1407281229305614338", "text": "CVE-2021-29458\n\nExiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The ...\n\nhttps://t.co/QRROfCOVRW?amp=1"}], "modified": "2021-06-03T07:38:03"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:4173"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-29458"]}, {"type": "archlinux", "idList": ["ASA-202106-54"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-29458"]}, {"type": "fedora", "idList": ["FEDORA:22782304C684", "FEDORA:C905730E433E"]}, {"type": "freebsd", "idList": ["D49F86AB-D9C7-11EB-A200-00155D01F201"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "UBUNTU_USN-4941-1.NASL"]}, {"type": "redhat", "idList": ["RHSA-2021:4173"]}, {"type": "redhatcve", "idList": ["RH:CVE-2021-29458"]}, {"type": "ubuntu", "idList": ["USN-4941-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-29458"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "exiv2", "version": 0}, {"name": "fedoraproject fedora", "version": 33}, {"name": "fedoraproject fedora", "version": 34}, {"name": "debian debian linux", "version": 10}]}, "epss": [{"cve": "CVE-2021-29458", "epss": 0.00068, "percentile": 0.27676, "modified": "2023-05-07"}], "short_description": "Exiv2 v0.27.3 and earlier out-of-bounds read vulnerabilit", "tags": ["exiv2", "cve-2021-29458", "image files", "metadata", "vulnerability", "denial of service", "nvd"], "vulnersScore": 5.8}, "_state": {"dependencies": 1701882658, "score": 1701878290, "affected_software_major_version": 0, "epss": 0, "chatgpt": 0}, "_internal": {"score_hash": "78a7a02353eebea2f29178d2484f9c1b", "chatgpt": "bcd8b0c2eb1fce714eab6cef0d771acc"}, "cna_cvss": {"cna": "GitHub_M", "cvss": {}}, "cpe": ["cpe:/o:fedoraproject:fedora:33", "cpe:/o:fedoraproject:fedora:34", "cpe:/o:debian:debian_linux:10.0"], "cpe23": ["cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"], "cwe": ["CWE-125"], "affectedSoftware": [{"cpeName": "exiv2:exiv2", "version": "0.27.4", "operator": "lt", "name": "exiv2"}, {"cpeName": "fedoraproject:fedora", "version": "33", "operator": "eq", "name": "fedoraproject fedora"}, {"cpeName": "fedoraproject:fedora", "version": "34", "operator": "eq", "name": "fedoraproject fedora"}, {"cpeName": "debian:debian_linux", "version": "10.0", "operator": "eq", "name": "debian debian linux"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:exiv2:exiv2:0.27.4:*:*:*:*:*:*:*", "versionEndExcluding": "0.27.4", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/Exiv2/exiv2/pull/1536", "name": "https://github.com/Exiv2/exiv2/pull/1536", "refsource": "MISC", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5", "name": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5", "refsource": "CONFIRM", "tags": ["Third Party Advisory"]}, {"url": "https://github.com/Exiv2/exiv2/issues/1530", "name": "https://github.com/Exiv2/exiv2/issues/1530", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html", "name": "[debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update", "refsource": "MLIST", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "name": "FEDORA-2021-10d7331a31", "refsource": "", "tags": []}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/", "name": "FEDORA-2021-be94728b95", "refsource": "", "tags": []}], "product_info": [{"vendor": "Exiv2", "product": "exiv2"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"type": "CWE", "lang": "en", "description": "CWE-125: Out-of-bounds Read", "cweId": "CWE-125"}]}], "exploits": [], "assigned": "2021-03-30T00:00:00"}
{"ubuntucve": [{"lastseen": "2023-12-07T14:06:58", "description": "Exiv2 is a command-line utility and C++ library for reading, writing,\ndeleting, and modifying the metadata of image files. An out-of-bounds read\nwas found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is\ntriggered when Exiv2 is used to write metadata into a crafted image file.\nAn attacker could potentially exploit the vulnerability to cause a denial\nof service by crashing Exiv2, if they can trick the victim into running\nExiv2 on a crafted image file. Note that this bug is only triggered when\nwriting the metadata, which is a less frequently used Exiv2 operation than\nreading the metadata. For example, to trigger the bug in the Exiv2\ncommand-line application, you need to add an extra command-line argument\nsuch as insert. The bug is fixed in version v0.27.4.\n\n#### Bugs\n\n * <https://bugs.launchpad.net/ubuntu/+source/exiv2/+bug/1923479>\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2021-29458", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2021-04-19T00:00:00", "id": "UB:CVE-2021-29458", "href": "https://ubuntu.com/security/CVE-2021-29458", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-12-07T13:59:50", "description": "An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows\nattackers to trigger a heap-based buffer overflow and cause a denial of\nservice (DOS) via crafted metadata.\n\n#### Bugs\n\n * <https://github.com/Exiv2/exiv2/issues/1530>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | This is the same commit that was used as part of the fix for CVE-2021-29458, so not-affected\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-07-26T00:00:00", "type": "ubuntucve", "title": "CVE-2021-31292", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458", "CVE-2021-31292"], "modified": "2021-07-26T00:00:00", "id": "UB:CVE-2021-31292", "href": "https://ubuntu.com/security/CVE-2021-31292", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "prion": [{"lastseen": "2023-11-22T00:46:37", "description": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.", "cvss3": {"cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}}, "published": "2021-04-19T19:15:00", "type": "prion", "title": "Out-of-bounds", "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2023-02-27T17:26:00", "id": "PRION:CVE-2021-29458", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2021-29458", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}], "alpinelinux": [{"lastseen": "2023-12-07T16:20:43", "description": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-04-19T19:15:00", "type": "alpinelinux", "title": "CVE-2021-29458", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2023-11-07T03:32:00", "id": "ALPINE:CVE-2021-29458", "href": "https://security.alpinelinux.org/vuln/CVE-2021-29458", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "veracode": [{"lastseen": "2022-07-26T16:44:41", "description": "Exiv2 is vulnerable to out-of-bounds read. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-05-06T11:15:17", "type": "veracode", "title": "Out-of-bounds Read", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2021-06-02T21:14:04", "id": "VERACODE:30364", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-30364/summary", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "redhatcve": [{"lastseen": "2023-12-06T17:46:35", "description": "There is a flaw in exiv2. An attacker who is able to submit a crafted file to be processed by an application linked with exiv2 could trigger an out-of-bounds read. The greatest risk of this flaw is to application availability and data confidentiality.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-04-22T16:44:01", "type": "redhatcve", "title": "CVE-2021-29458", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2023-04-06T08:01:29", "id": "RH:CVE-2021-29458", "href": "https://access.redhat.com/security/cve/cve-2021-29458", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "debiancve": [{"lastseen": "2023-12-06T18:21:58", "description": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-04-19T19:15:00", "type": "debiancve", "title": "CVE-2021-29458", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2021-04-19T19:15:00", "id": "DEBIANCVE:CVE-2021-29458", "href": "https://security-tracker.debian.org/tracker/CVE-2021-29458", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "cbl_mariner": [{"lastseen": "2023-12-06T15:26:32", "description": "CVE-2021-29458 affecting package exiv2 0.27.2-3. An upgraded version of the package is available that resolves this issue.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2022-06-25T20:53:09", "type": "cbl_mariner", "title": "CVE-2021-29458 affecting package exiv2 0.27.2-3", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29458"], "modified": "2022-06-25T20:53:09", "id": "CBLMARINER:7207", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2023-12-06T18:49:32", "description": "## Releases\n\n * Ubuntu 21.04 \n * Ubuntu 20.10 \n * Ubuntu 20.04 LTS\n * Ubuntu 18.04 ESM\n * Ubuntu 16.04 ESM\n\n## Packages\n\n * exiv2 \\- EXIF/IPTC/XMP metadata manipulation tool\n\nIt was discovered that Exiv2 incorrectly handled certain images. \nAn attacker could possibly use this issue to execute arbitrary code or cause \na crash. (CVE-2021-29457)\n\nIt was discovered that Exiv2 incorrectly handled certain images. \nAn attacker could possibly use this issue to cause a denial of service. \n(CVE-2021-29458, CVE-2021-29470)\n\nIt was discovered that Exiv2 incorrectly handled certain images. \nAn attacker could possibly use this issue to execute arbitrary code or \ncause a crash. (CVE-2021-3482)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-10T00:00:00", "type": "ubuntu", "title": "Exiv2 vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-3482"], "modified": "2021-05-10T00:00:00", "id": "USN-4941-1", "href": "https://ubuntu.com/security/notices/USN-4941-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-10-18T14:55:23", "description": "The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-4941-1 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS : Exiv2 vulnerabilities (USN-4941-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-3482"], "modified": "2023-10-16T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:esm", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:exiv2", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-14", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-27", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-dev"], "id": "UBUNTU_USN-4941-1.NASL", "href": "https://www.tenable.com/plugins/nessus/149418", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4941-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149418);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/16\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29470\"\n );\n script_xref(name:\"USN\", value:\"4941-1\");\n\n script_name(english:\"Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS : Exiv2 vulnerabilities (USN-4941-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04 host has packages installed that are affected by\nmultiple vulnerabilities as referenced in the USN-4941-1 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4941-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-27\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-dev\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2021-2023 Canonical, Inc. / NASL script (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release || '20.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04 / 20.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'exiv2', 'pkgver': '0.25-2.1ubuntu16.04.7+esm1'},\n {'osver': '16.04', 'pkgname': 'libexiv2-14', 'pkgver': '0.25-2.1ubuntu16.04.7+esm1'},\n {'osver': '16.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.25-2.1ubuntu16.04.7+esm1'},\n {'osver': '18.04', 'pkgname': 'exiv2', 'pkgver': '0.25-3.1ubuntu0.18.04.7'},\n {'osver': '18.04', 'pkgname': 'libexiv2-14', 'pkgver': '0.25-3.1ubuntu0.18.04.7'},\n {'osver': '18.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.25-3.1ubuntu0.18.04.7'},\n {'osver': '20.04', 'pkgname': 'exiv2', 'pkgver': '0.27.2-8ubuntu2.2'},\n {'osver': '20.04', 'pkgname': 'libexiv2-27', 'pkgver': '0.27.2-8ubuntu2.2'},\n {'osver': '20.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.27.2-8ubuntu2.2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / libexiv2-14 / libexiv2-27 / libexiv2-dev');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-02T16:24:37", "description": "According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29458)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.(CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29464)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29463)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-09-07T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : exiv2 (EulerOS-SA-2021-2327)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-3482"], "modified": "2023-12-01T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2327.NASL", "href": "https://www.tenable.com/plugins/nessus/153079", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153079);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/12/01\");\n\n script_cve_id(\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-3482\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : exiv2 (EulerOS-SA-2021-2327)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 package installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in\n Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into\n a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if\n they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only\n triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the\n metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra\n command-line argument such as `insert`.(CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29458)\n\n - A flaw was found in Exiv2 in versions before and\n including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in\n jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF\n data.(CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in\n Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into\n a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if\n they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only\n triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the\n metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra\n command-line argument such as `insert`.(CVE-2021-29464)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n `insert`.(CVE-2021-29463)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2327\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9e9228de\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/09/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"exiv2-libs-0.26-3.h14.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:37:20", "description": "According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-10-25T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : exiv2 (EulerOS-SA-2021-2579)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-32617"], "modified": "2023-11-29T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2579.NASL", "href": "https://www.tenable.com/plugins/nessus/154372", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(154372);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/29\");\n\n script_cve_id(\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29473\",\n \"CVE-2021-31291\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : exiv2 (EulerOS-SA-2021-2579)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a\n duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this\n candidate. All references and descriptions in this candidate have been removed to prevent accidental\n usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security\nadvisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional\nissues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2579\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8fa50dac\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/10/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nvar uvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nvar sp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nvar flag = 0;\n\nvar pkgs = [\n \"exiv2-libs-0.23-6.h13\"\n];\n\nforeach (var pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-07T15:16:32", "description": "According to the versions of the exiv2 packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29458)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.(CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4.(CVE-2021-29623)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than\n _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`.(CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-08-09T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : exiv2 (EulerOS-SA-2021-2293)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2023-12-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2", "p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2293.NASL", "href": "https://www.tenable.com/plugins/nessus/152325", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152325);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/12/06\");\n\n script_cve_id(\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29623\",\n \"CVE-2021-32617\",\n \"CVE-2021-3482\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : exiv2 (EulerOS-SA-2021-2293)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29458)\n\n - A flaw was found in Exiv2 in versions before and\n including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in\n jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF\n data.(CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n `insert`.(CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in\n Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into\n a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if\n they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only\n triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the\n metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra\n command-line argument such as `insert`.(CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to\n read, write, delete and modify Exif, IPTC, XMP and ICC\n image metadata. A read of uninitialized memory was\n found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading,\n writing, deleting, and modifying the metadata of image\n files. The read of uninitialized memory is triggered\n when Exiv2 is used to read the metadata of a crafted\n image file. An attacker could potentially exploit the\n vulnerability to leak a few bytes of stack memory, if\n they can trick the victim into running Exiv2 on a\n crafted image file. The bug is fixed in version\n v0.27.4.(CVE-2021-29623)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic\n complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when\n Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image\n file. The bug is fixed in version v0.27.4. Note that\n this bug is only triggered when _writing_ the metadata,\n which is a less frequently used Exiv2 operation than\n _reading_ the metadata. For example, to trigger the bug\n in the Exiv2 command-line application, you need to add\n an extra command-line argument such as\n `rm`.(CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2293\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b24e2649\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"exiv2-0.26-12.h16.eulerosv2r8\",\n \"exiv2-libs-0.26-12.h16.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-01T15:19:02", "description": "According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file.(CVE-2021-32617)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.(CVE-2019-17402)\n\n - Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.(CVE-2018-16336)\n\n - Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.(CVE-2018-19607)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp.(CVE-2018-11531)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-09-14T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP2 : exiv2 (EulerOS-SA-2021-2367)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10999", "CVE-2018-11531", "CVE-2018-16336", "CVE-2018-19607", "CVE-2019-17402", "CVE-2021-29458", "CVE-2021-29473", "CVE-2021-32617"], "modified": "2023-11-30T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2367.NASL", "href": "https://www.tenable.com/plugins/nessus/153280", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153280);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/30\");\n\n script_cve_id(\n \"CVE-2018-11531\",\n \"CVE-2018-16336\",\n \"CVE-2018-19607\",\n \"CVE-2019-17402\",\n \"CVE-2021-29458\",\n \"CVE-2021-29473\",\n \"CVE-2021-32617\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : exiv2 (EulerOS-SA-2021-2367)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 package installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to\n read, write, delete and modify Exif, IPTC, XMP and ICC\n image metadata. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading,\n writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2\n is used to write metadata into a crafted image file. An\n attacker could potentially exploit the vulnerability to\n cause a denial of service by crashing Exiv2, if they\n can trick the victim into running Exiv2 on a crafted\n image file. Note that this bug is only triggered when\n writing the metadata, which is a less frequently used\n Exiv2 operation than reading the metadata. For example,\n to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line\n argument such as `insert`.(CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic\n complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when\n Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image\n file.(CVE-2021-32617)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in\n Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in\n crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and\n size.(CVE-2019-17402)\n\n - Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26\n allows remote attackers to cause a denial of service\n (heap-based buffer over-read) via a crafted image file,\n a different vulnerability than\n CVE-2018-10999.(CVE-2018-16336)\n\n - Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted file.(CVE-2018-19607)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData\n in preview.cpp.(CVE-2018-11531)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2367\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5015edaf\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-11531\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/09/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"exiv2-libs-0.23-6.h8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:31:59", "description": "Exiv2 teams reports :\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds, read of uninitialized memory and denial of serivce. The heap overflow is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file.", "cvss3": {}, "published": "2021-07-06T00:00:00", "type": "nessus", "title": "FreeBSD : Exiv2 -- Multiple vulnerabilities (d49f86ab-d9c7-11eb-a200-00155d01f201)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-07-08T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:exiv2", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "href": "https://www.tenable.com/plugins/nessus/151377", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(151377);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/08\");\n\n script_cve_id(\"CVE-2021-29457\", \"CVE-2021-29458\", \"CVE-2021-29463\", \"CVE-2021-29464\", \"CVE-2021-29470\", \"CVE-2021-29473\", \"CVE-2021-29623\", \"CVE-2021-32617\", \"CVE-2021-3482\");\n\n script_name(english:\"FreeBSD : Exiv2 -- Multiple vulnerabilities (d49f86ab-d9c7-11eb-a200-00155d01f201)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Exiv2 teams reports :\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds,\nread of uninitialized memory and denial of serivce. The heap overflow\nis triggered when Exiv2 is used to read the metadata of a crafted\nimage file. An attacker could potentially exploit the vulnerability to\ngain code execution, if they can trick the victim into running Exiv2\non a crafted image file. The out-of-bounds read is triggered when\nExiv2 is used to write metadata into a crafted image file. An attacker\ncould potentially exploit the vulnerability to cause a denial of\nservice by crashing Exiv2, if they can trick the victim into running\nExiv2 on a crafted image file. The read of uninitialized memory is\ntriggered when Exiv2 is used to read the metadata of a crafted image\nfile. An attacker could potentially exploit the vulnerability to leak\na few bytes of stack memory, if they can trick the victim into running\nExiv2 on a crafted image file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9\"\n );\n # https://vuxml.freebsd.org/freebsd/d49f86ab-d9c7-11eb-a200-00155d01f201.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?062220b4\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"exiv2<0.27.4,1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-12T13:31:05", "description": "The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:4173 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-11-06T00:00:00", "type": "nessus", "title": "Rocky Linux 8 : exiv2 (RLSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-06T00:00:00", "cpe": ["p-cpe:/a:rocky:linux:exiv2", "p-cpe:/a:rocky:linux:exiv2-debuginfo", "p-cpe:/a:rocky:linux:exiv2-debugsource", "p-cpe:/a:rocky:linux:exiv2-devel", "p-cpe:/a:rocky:linux:exiv2-doc", "p-cpe:/a:rocky:linux:exiv2-libs", "p-cpe:/a:rocky:linux:exiv2-libs-debuginfo", "cpe:/o:rocky:linux:8"], "id": "ROCKY_LINUX_RLSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/184583", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# Rocky Linux Security Advisory RLSA-2021:4173.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(184583);\n script_version(\"1.0\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/06\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RLSA\", value:\"2021:4173\");\n\n script_name(english:\"Rocky Linux 8 : exiv2 (RLSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Rocky Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nRLSA-2021:4173 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2\n is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of\n image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack\n memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in\n version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into\n running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC\n profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p\n C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://errata.rockylinux.org/RLSA-2021:4173\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1946314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1952607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1952612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1953708\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1954065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1961650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1961691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1978100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1978105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1989860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1990330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1992165\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1992174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/11/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:rocky:linux:8\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Rocky Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RockyLinux/release\", \"Host/RockyLinux/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RockyLinux/release');\nif (isnull(os_release) || 'Rocky Linux' >!< os_release) audit(AUDIT_OS_NOT, 'Rocky Linux');\nvar os_ver = pregmatch(pattern: \"Rocky(?: Linux)? release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Rocky Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Rocky Linux 8.x', 'Rocky Linux ' + os_ver);\n\nif (!get_kb_item('Host/RockyLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Rocky Linux', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debugsource-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debugsource-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = 'Rocky-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-debuginfo / exiv2-debugsource / exiv2-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:38:42", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-11-11T00:00:00", "type": "nessus", "title": "RHEL 8 : exiv2 (RHSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-24T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:exiv2", "p-cpe:/a:redhat:enterprise_linux:exiv2-devel", "p-cpe:/a:redhat:enterprise_linux:exiv2-doc", "p-cpe:/a:redhat:enterprise_linux:exiv2-libs"], "id": "REDHAT-RHSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/155217", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2021:4173. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155217);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/24\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RHSA\", value:\"2021:4173\");\n\n script_name(english:\"RHEL 8 : exiv2 (RHSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS\n (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29463\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29464\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29470\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-32617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-37618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-37619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:4173\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1946314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1952607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1952612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1953708\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1954065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1961650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1961691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1978100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1978105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1990330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1992165\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1992174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 119, 120, 125, 190, 400, 704, 787, 908);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-libs\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/appstream/debug',\n 'content/eus/rhel8/8.6/aarch64/appstream/os',\n 'content/eus/rhel8/8.6/aarch64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/baseos/debug',\n 'content/eus/rhel8/8.6/aarch64/baseos/os',\n 'content/eus/rhel8/8.6/aarch64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/os',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/highavailability/debug',\n 'content/eus/rhel8/8.6/aarch64/highavailability/os',\n 'content/eus/rhel8/8.6/aarch64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/supplementary/debug',\n 'content/eus/rhel8/8.6/aarch64/supplementary/os',\n 'content/eus/rhel8/8.6/aarch64/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/appstream/debug',\n 'content/eus/rhel8/8.6/ppc64le/appstream/os',\n 'content/eus/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/baseos/debug',\n 'content/eus/rhel8/8.6/ppc64le/baseos/os',\n 'content/eus/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/debug',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/os',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/os',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/debug',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/os',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap/os',\n 'content/eus/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/debug',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/os',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/appstream/debug',\n 'content/eus/rhel8/8.6/s390x/appstream/os',\n 'content/eus/rhel8/8.6/s390x/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/baseos/debug',\n 'content/eus/rhel8/8.6/s390x/baseos/os',\n 'content/eus/rhel8/8.6/s390x/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/debug',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/os',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/highavailability/debug',\n 'content/eus/rhel8/8.6/s390x/highavailability/os',\n 'content/eus/rhel8/8.6/s390x/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/debug',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/os',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/sap/debug',\n 'content/eus/rhel8/8.6/s390x/sap/os',\n 'content/eus/rhel8/8.6/s390x/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/supplementary/debug',\n 'content/eus/rhel8/8.6/s390x/supplementary/os',\n 'content/eus/rhel8/8.6/s390x/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'exiv2-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/aarch64/appstream/debug',\n 'content/dist/rhel8/8/aarch64/appstream/os',\n 'content/dist/rhel8/8/aarch64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/baseos/debug',\n 'content/dist/rhel8/8/aarch64/baseos/os',\n 'content/dist/rhel8/8/aarch64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/codeready-builder/debug',\n 'content/dist/rhel8/8/aarch64/codeready-builder/os',\n 'content/dist/rhel8/8/aarch64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/highavailability/debug',\n 'content/dist/rhel8/8/aarch64/highavailability/os',\n 'content/dist/rhel8/8/aarch64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/supplementary/debug',\n 'content/dist/rhel8/8/aarch64/supplementary/os',\n 'content/dist/rhel8/8/aarch64/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/appstream/debug',\n 'content/dist/rhel8/8/ppc64le/appstream/os',\n 'content/dist/rhel8/8/ppc64le/appstream/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/baseos/debug',\n 'content/dist/rhel8/8/ppc64le/baseos/os',\n 'content/dist/rhel8/8/ppc64le/baseos/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/debug',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/os',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/highavailability/debug',\n 'content/dist/rhel8/8/ppc64le/highavailability/os',\n 'content/dist/rhel8/8/ppc64le/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/debug',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/os',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/debug',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/os',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap/debug',\n 'content/dist/rhel8/8/ppc64le/sap/os',\n 'content/dist/rhel8/8/ppc64le/sap/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/supplementary/debug',\n 'content/dist/rhel8/8/ppc64le/supplementary/os',\n 'content/dist/rhel8/8/ppc64le/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/s390x/appstream/debug',\n 'content/dist/rhel8/8/s390x/appstream/os',\n 'content/dist/rhel8/8/s390x/appstream/source/SRPMS',\n 'content/dist/rhel8/8/s390x/baseos/debug',\n 'content/dist/rhel8/8/s390x/baseos/os',\n 'content/dist/rhel8/8/s390x/baseos/source/SRPMS',\n 'content/dist/rhel8/8/s390x/codeready-builder/debug',\n 'content/dist/rhel8/8/s390x/codeready-builder/os',\n 'content/dist/rhel8/8/s390x/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/s390x/highavailability/debug',\n 'content/dist/rhel8/8/s390x/highavailability/os',\n 'content/dist/rhel8/8/s390x/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/s390x/resilientstorage/debug',\n 'content/dist/rhel8/8/s390x/resilientstorage/os',\n 'content/dist/rhel8/8/s390x/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/s390x/sap/debug',\n 'content/dist/rhel8/8/s390x/sap/os',\n 'content/dist/rhel8/8/s390x/sap/source/SRPMS',\n 'content/dist/rhel8/8/s390x/supplementary/debug',\n 'content/dist/rhel8/8/s390x/supplementary/os',\n 'content/dist/rhel8/8/s390x/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'exiv2-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-11T15:32:31", "description": "The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2021:4173 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-02-09T00:00:00", "type": "nessus", "title": "AlmaLinux 8 : exiv2 (ALSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-10T00:00:00", "cpe": ["p-cpe:/a:alma:linux:exiv2", "p-cpe:/a:alma:linux:exiv2-devel", "p-cpe:/a:alma:linux:exiv2-doc", "p-cpe:/a:alma:linux:exiv2-libs", "cpe:/o:alma:linux:8"], "id": "ALMA_LINUX_ALSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/157702", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# AlmaLinux Security Advisory ALSA-2021:4173.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157702);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/10\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"ALSA\", value:\"2021:4173\");\n\n script_name(english:\"AlmaLinux 8 : exiv2 (ALSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote AlmaLinux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nALSA-2021:4173 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2\n is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of\n image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack\n memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in\n version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into\n running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC\n profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p\n C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://errata.almalinux.org/8/ALSA-2021-4173.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:alma:linux:8\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Alma Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AlmaLinux/release\", \"Host/AlmaLinux/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/AlmaLinux/release');\nif (isnull(release) || 'AlmaLinux' >!< release) audit(AUDIT_OS_NOT, 'AlmaLinux');\nvar os_ver = pregmatch(pattern: \"AlmaLinux release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'AlmaLinux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'AlmaLinux 8.x', 'AlmaLinux ' + os_ver);\n\nif (!get_kb_item('Host/AlmaLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'AlmaLinux', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'Alma-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release && (!exists_check || rpm_exists(release:release, rpm:exists_check))) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T15:27:34", "description": "The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-11-11T00:00:00", "type": "nessus", "title": "CentOS 8 : exiv2 (CESA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-24T00:00:00", "cpe": ["cpe:/o:centos:centos:8-stream", "p-cpe:/a:centos:centos:exiv2", "p-cpe:/a:centos:centos:exiv2-devel", "p-cpe:/a:centos:centos:exiv2-doc", "p-cpe:/a:centos:centos:exiv2-libs"], "id": "CENTOS8_RHSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/155035", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# Red Hat Security Advisory RHSA-2021:4173. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155035);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/24\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RHSA\", value:\"2021:4173\");\n\n script_name(english:\"CentOS 8 : exiv2 (CESA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CentOS host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nCESA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS\n (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:4173\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8-stream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-libs\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CentOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/CentOS/release');\nif (isnull(release) || 'CentOS' >!< release) audit(AUDIT_OS_NOT, 'CentOS');\nvar os_ver = pregmatch(pattern: \"CentOS(?: Stream)?(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'CentOS');\nvar os_ver = os_ver[1];\nif ('CentOS Stream' >!< release) audit(AUDIT_OS_NOT, 'CentOS 8-Stream');\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'CentOS 8.x', 'CentOS ' + os_ver);\n\nif (!get_kb_item('Host/CentOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'CentOS', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'CentOS-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-09T21:01:58", "description": "The remote NewStart CGSL host, running version MAIN 6.02, has exiv2 packages installed that are affected by multiple vulnerabilities:\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-15T00:00:00", "type": "nessus", "title": "NewStart CGSL MAIN 6.02 : exiv2 Multiple Vulnerabilities (NS-SA-2022-0090)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17402", "CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-09T00:00:00", "cpe": ["p-cpe:/a:zte:cgsl_main:exiv2-libs", "cpe:/o:zte:cgsl_main:6"], "id": "NEWSTART_CGSL_NS-SA-2022-0090_EXIV2.NASL", "href": "https://www.tenable.com/plugins/nessus/167490", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2022-0090. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(167490);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/09\");\n\n script_cve_id(\n \"CVE-2019-17402\",\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31291\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n\n script_name(english:\"NewStart CGSL MAIN 6.02 : exiv2 Multiple Vulnerabilities (NS-SA-2022-0090)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote NewStart CGSL host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version MAIN 6.02, has exiv2 packages installed that are affected by multiple\nvulnerabilities:\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2022-0090\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2019-17402\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29458\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29463\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29464\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29470\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29623\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-31291\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-32617\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37618\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37619\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL exiv2 packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:zte:cgsl_main:6\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar os_release = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(os_release) || os_release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (os_release !~ \"CGSL MAIN 6.02\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 6.02');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nvar flag = 0;\n\nvar pkgs = {\n 'CGSL MAIN 6.02': [\n 'exiv2-libs-0.27.4-5.el8'\n ]\n};\nvar pkg_list = pkgs[os_release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + os_release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-08T20:26:24", "description": "The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3265 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. (CVE-2017-14859)\n\n - An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp in Exiv2 0.26.\n The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n (CVE-2017-14862)\n\n - An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n (CVE-2017-14864)\n\n - There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.\n (CVE-2017-17669)\n\n - Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF file. (CVE-2017-18005)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file. (CVE-2018-19107)\n\n - In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.\n (CVE-2018-19108)\n\n - In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service (application crash due to a heap-based buffer over-read) via a crafted PNG file. (CVE-2018-19535)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file. (CVE-2018-8976)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.\n (CVE-2019-13112)\n\n - http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. (CVE-2019-13114)\n\n - There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.\n (CVE-2019-13504)\n\n - Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file. (CVE-2019-14369)\n\n - In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service. (CVE-2019-14370)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which can result in an information leak. (CVE-2020-18771)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.\n (CVE-2021-34334)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5. (CVE-2021-37620)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5. (CVE-2021-37621)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when deleting the IPTC data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-d I rm`). The bug is fixed in version v0.27.5. (CVE-2021-37622)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-01-11T00:00:00", "type": "nessus", "title": "Debian DLA-3265-1 : exiv2 - LTS security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-11591", "CVE-2017-14859", "CVE-2017-14862", "CVE-2017-14864", "CVE-2017-17669", "CVE-2017-18005", "CVE-2018-17581", "CVE-2018-19107", "CVE-2018-19108", "CVE-2018-19535", "CVE-2018-20097", "CVE-2018-8976", "CVE-2019-13110", "CVE-2019-13112", "CVE-2019-13114", "CVE-2019-13504", "CVE-2019-14369", "CVE-2019-14370", "CVE-2019-17402", "CVE-2020-18771", "CVE-2021-29458", "CVE-2021-32815", "CVE-2021-34334", "CVE-2021-37620", "CVE-2021-37621", "CVE-2021-37622"], "modified": "2023-09-08T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:exiv2", "p-cpe:/a:debian:debian_linux:libexiv2-14", "p-cpe:/a:debian:debian_linux:libexiv2-dev", "p-cpe:/a:debian:debian_linux:libexiv2-doc", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DLA-3265.NASL", "href": "https://www.tenable.com/plugins/nessus/169913", "sourceData": "#%NASL_MIN_LEVEL 80900\n#\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dla-3265. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(169913);\n script_version(\"1.1\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/09/08\");\n\n script_cve_id(\n \"CVE-2017-11591\",\n \"CVE-2017-14859\",\n \"CVE-2017-14862\",\n \"CVE-2017-14864\",\n \"CVE-2017-17669\",\n \"CVE-2017-18005\",\n \"CVE-2018-8976\",\n \"CVE-2018-17581\",\n \"CVE-2018-19107\",\n \"CVE-2018-19108\",\n \"CVE-2018-19535\",\n \"CVE-2018-20097\",\n \"CVE-2019-13110\",\n \"CVE-2019-13112\",\n \"CVE-2019-13114\",\n \"CVE-2019-13504\",\n \"CVE-2019-14369\",\n \"CVE-2019-14370\",\n \"CVE-2019-17402\",\n \"CVE-2020-18771\",\n \"CVE-2021-29458\",\n \"CVE-2021-32815\",\n \"CVE-2021-34334\",\n \"CVE-2021-37620\",\n \"CVE-2021-37621\",\n \"CVE-2021-37622\"\n );\n\n script_name(english:\"Debian DLA-3265-1 : exiv2 - LTS security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndla-3265 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a\n remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2\n 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of\n service. (CVE-2017-14859)\n\n - An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp in Exiv2 0.26.\n The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n (CVE-2017-14862)\n\n - An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The\n vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n (CVE-2017-14864)\n\n - There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of\n pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.\n (CVE-2017-17669)\n\n - Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related\n to crafted metadata in a TIFF file. (CVE-2017-18005)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a\n recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader)\n may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a\n crafted PSD image file. (CVE-2018-19107)\n\n - In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a\n denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.\n (CVE-2018-19108)\n\n - In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of\n service (application crash due to a heap-based buffer over-read) via a crafted PNG file. (CVE-2018-19535)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp\n Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file. (CVE-2018-8976)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an\n attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to\n cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.\n (CVE-2019-13112)\n\n - http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a\n NULL pointer dereference) by returning a crafted response that lacks a space character. (CVE-2019-13114)\n\n - There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.\n (CVE-2019-13504)\n\n - Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of\n service (heap-based buffer over-read) via a crafted image file. (CVE-2019-14369)\n\n - In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It\n could result in denial of service. (CVE-2019-14370)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal::Nikon1MakerNote::print0x0088 in\n nikonmn_int.cpp which can result in an information leak. (CVE-2020-18771)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted\n image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they\n can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when\n modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and\n bug fix: #1739 ### For more information Please see our [security\n policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.\n (CVE-2021-34334)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into\n running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5. (CVE-2021-37620)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is\n triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially\n exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on\n a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a\n less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed\n in version v0.27.5. (CVE-2021-37621)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is\n triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially\n exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on\n a crafted image file. Note that this bug is only triggered when deleting the IPTC data, which is a less\n frequently used Exiv2 operation that requires an extra command line option (`-d I rm`). The bug is fixed\n in version v0.27.5. (CVE-2021-37622)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876893\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/exiv2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/lts/security/2023/dla-3265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-11591\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-14859\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-14862\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-14864\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-17669\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2017-18005\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-17581\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-19107\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-19108\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-19535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-20097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2018-8976\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-13110\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-13112\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-13114\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-13504\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-14369\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-14370\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-17402\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2020-18771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-29458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-32815\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-34334\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-37620\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-37621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-37622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/buster/exiv2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the exiv2 packages.\n\nFor Debian 10 buster, these problems have been fixed in version 0.25-4+deb10u4.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-18771\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/01/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar debian_release = get_kb_item('Host/Debian/release');\nif ( isnull(debian_release) ) audit(AUDIT_OS_NOT, 'Debian');\ndebian_release = chomp(debian_release);\nif (! preg(pattern:\"^(10)\\.[0-9]+\", string:debian_release)) audit(AUDIT_OS_NOT, 'Debian 10.0', 'Debian ' + debian_release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '10.0', 'prefix': 'exiv2', 'reference': '0.25-4+deb10u4'},\n {'release': '10.0', 'prefix': 'libexiv2-14', 'reference': '0.25-4+deb10u4'},\n {'release': '10.0', 'prefix': 'libexiv2-dev', 'reference': '0.25-4+deb10u4'},\n {'release': '10.0', 'prefix': 'libexiv2-doc', 'reference': '0.25-4+deb10u4'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var _release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (_release && prefix && reference) {\n if (deb_check(release:_release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / libexiv2-14 / libexiv2-dev / libexiv2-doc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "fedora": [{"lastseen": "2023-12-06T15:52:42", "description": "A command line utility to access image metadata, allowing one to: * print the Exif metadata of Jpeg images as summary info, interpreted value s, or the plain data for each tag * print the Iptc metadata of Jpeg images * print the Jpeg comment of Jpeg images * set, add and delete Exif and Iptc metadata of Jpeg images * adjust the Exif timestamp (that's how it all started...) * rename Exif image files according to the Exif timestamp * extract, insert and delete Exif metadata (including thumbnails), Iptc metadata and Jpeg comments ", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-04T01:01:31", "type": "fedora", "title": "[SECURITY] Fedora 34 Update: exiv2-0.27.3-6.fc34", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-3482"], "modified": "2021-05-04T01:01:31", "id": "FEDORA:22782304C684", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-12-06T15:52:42", "description": "A command line utility to access image metadata, allowing one to: * print the Exif metadata of Jpeg images as summary info, interpreted value s, or the plain data for each tag * print the Iptc metadata of Jpeg images * print the Jpeg comment of Jpeg images * set, add and delete Exif and Iptc metadata of Jpeg images * adjust the Exif timestamp (that's how it all started...) * rename Exif image files according to the Exif timestamp * extract, insert and delete Exif metadata (including thumbnails), Iptc metadata and Jpeg comments ", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-14T21:12:27", "type": "fedora", "title": "[SECURITY] Fedora 33 Update: exiv2-0.27.3-6.fc33", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-3482"], "modified": "2021-05-14T21:12:27", "id": "FEDORA:C905730E433E", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2023-12-06T15:47:18", "description": "\n\nExiv2 teams reports:\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds,\n\t read of uninitialized memory and denial of serivce. The heap\n\t overflow is triggered when Exiv2 is used to read the metadata of\n\t a crafted image file. An attacker could potentially exploit the\n\t vulnerability to gain code execution, if they can trick the victim\n\t into running Exiv2 on a crafted image file. The out-of-bounds read\n\t is triggered when Exiv2 is used to write metadata into a crafted\n\t image file. An attacker could potentially exploit the vulnerability\n\t to cause a denial of service by crashing Exiv2, if they can trick\n\t the victim into running Exiv2 on a crafted image file. The read of\n\t uninitialized memory is triggered when Exiv2 is used to read the\n\t metadata of a crafted image file. An attacker could potentially\n\t exploit the vulnerability to leak a few bytes of stack memory, if\n\t they can trick the victim into running Exiv2 on a crafted image\n\t file.\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-04-25T00:00:00", "type": "freebsd", "title": "Exiv2 -- Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-04-25T00:00:00", "id": "D49F86AB-D9C7-11EB-A200-00155D01F201", "href": "https://vuxml.freebsd.org/freebsd/d49f86ab-d9c7-11eb-a200-00155d01f201.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2023-12-06T15:33:51", "description": "Arch Linux Security Advisory ASA-202106-54\n==========================================\n\nSeverity: Low\nDate : 2021-06-22\nCVE-ID : CVE-2021-3482 CVE-2021-29457 CVE-2021-29458 CVE-2021-29463\nCVE-2021-29464 CVE-2021-29470 CVE-2021-29473 CVE-2021-29623\nCVE-2021-32617\nPackage : exiv2\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1772\n\nSummary\n=======\n\nThe package exiv2 before version 0.27.4-1 is vulnerable to multiple\nissues including arbitrary code execution, denial of service and\ninformation disclosure.\n\nResolution\n==========\n\nUpgrade to 0.27.4-1.\n\n# pacman -Syu \"exiv2>=0.27.4-1\"\n\nThe problems have been fixed upstream in version 0.27.4.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2021-3482 (arbitrary code execution)\n\nA security issue was found in Exiv2 in versions before version 0.27.4.\nImproper input validation of the rawData.size property in\nJp2Image::readMetadata() in jp2image.cpp can lead to a heap-based\nbuffer overflow via a crafted JPG image containing malicious EXIF data.\nAn attacker could potentially exploit the vulnerability to gain code\nexecution, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\n- CVE-2021-29457 (arbitrary code execution)\n\nA heap buffer overflow was found in Exiv2 before version 0.27.4. The\nheap overflow is triggered when Exiv2 is used to write metadata into a\ncrafted image file. An attacker could potentially exploit the\nvulnerability to gain code execution, if they can trick the victim into\nrunning Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when _writing_ the metadata, which\nis a less frequently used Exiv2 operation than _reading_ the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29458 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29463 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29464 (arbitrary code execution)\n\nA heap buffer overflow was found in Exiv2 before version 0.27.4. The\nheap overflow is triggered when Exiv2 is used to write metadata into a\ncrafted image file. An attacker could potentially exploit the\nvulnerability to gain code execution, if they can trick the victim into\nrunning Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29470 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29473 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. An\nattacker could potentially exploit the vulnerability to cause a denial\nof service by crashing Exiv2, if they can trick the victim into running\nExiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29623 (information disclosure)\n\nA read of uninitialized memory was found in Exiv2 before version\n0.27.4. The read of uninitialized memory is triggered when Exiv2 is\nused to read the metadata of a crafted image file. An attacker could\npotentially exploit the vulnerability to leak a few bytes of stack\nmemory, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\n- CVE-2021-32617 (denial of service)\n\nAn inefficient algorithm (quadratic complexity) was found in Exiv2\nbefore version 0.27.4. The inefficient algorithm is triggered when\nExiv2 is used to write metadata into a crafted image file. An attacker\ncould potentially exploit the vulnerability to cause a denial of\nservice, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\nNote that this bug is only triggered when _writing_ the metadata, which\nis a less frequently used Exiv2 operation than _reading_ the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as rm.\n\nImpact\n======\n\nReading or writing EXIF metadata of a crafted image file could lead to\narbitrary code execution.\n\nReferences\n==========\n\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9\nhttps://github.com/Exiv2/exiv2/issues/1522\nhttps://github.com/Exiv2/exiv2/pull/1523\nhttps://github.com/Exiv2/exiv2/commit/22ea582c6b74ada30bec3a6b15de3c3e52f2b4da\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm\nhttps://github.com/Exiv2/exiv2/issues/1529\nhttps://github.com/Exiv2/exiv2/pull/1534\nhttps://github.com/Exiv2/exiv2/commit/13e5a3e02339b746abcaee6408893ca2fd8e289d\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5\nhttps://github.com/Exiv2/exiv2/issues/1530\nhttps://github.com/Exiv2/exiv2/pull/1536\nhttps://github.com/Exiv2/exiv2/pull/1539\nhttps://github.com/Exiv2/exiv2/commit/9b7a19f957af53304655ed1efe32253a1b11a8d0\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr\nhttps://github.com/Exiv2/exiv2/pull/1577\nhttps://github.com/Exiv2/exiv2/commit/d639e45c2cdc18b9b49b1307c6e4315277fa8cc4\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p\nhttps://github.com/Exiv2/exiv2/pull/1576\nhttps://github.com/Exiv2/exiv2/commit/0357f341e43f6e14123f227946574231ba379637\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj\nhttps://github.com/Exiv2/exiv2/pull/1581\nhttps://github.com/Exiv2/exiv2/commit/f6ee71526eef5649a529ac6da3f2843e3b63e227\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2\nhttps://github.com/Exiv2/exiv2/pull/1587\nhttps://github.com/Exiv2/exiv2/commit/e6a0982f7cd9282052b6e3485a458d60629ffa0b\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v\nhttps://github.com/Exiv2/exiv2/pull/1627\nhttps://github.com/Exiv2/exiv2/commit/0f9eb74c44c908e170a64cab590949d53749af8e\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj\nhttps://github.com/Exiv2/exiv2/pull/1657\nhttps://github.com/Exiv2/exiv2/commit/c261fbaa2567687eec6a595d3016212fd6ae648d\nhttps://security.archlinux.org/CVE-2021-3482\nhttps://security.archlinux.org/CVE-2021-29457\nhttps://security.archlinux.org/CVE-2021-29458\nhttps://security.archlinux.org/CVE-2021-29463\nhttps://security.archlinux.org/CVE-2021-29464\nhttps://security.archlinux.org/CVE-2021-29470\nhttps://security.archlinux.org/CVE-2021-29473\nhttps://security.archlinux.org/CVE-2021-29623\nhttps://security.archlinux.org/CVE-2021-32617", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-06-22T00:00:00", "type": "archlinux", "title": "[ASA-202106-54] exiv2: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-06-22T00:00:00", "id": "ASA-202106-54", "href": "https://security.archlinux.org/ASA-202106-54", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2023-12-06T16:56:01", "description": "The updated packages fix security vulnerabilities: Heap-based buffer overflow in Jp2Image::readMetadata(). (CVE-2021-3482) Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata. (CVE-2021-29457) Out-of-bounds read in Exiv2::Internal::CrwMap::encode. (CVE-2021-29458) Exiv2 incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. (CVE-2021-29463) Exiv2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-29464) Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header. (CVE-2021-29470) Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata. (CVE-2021-29473) Read of uninitialized memory may lead to information leak. (CVE-2021-29623) DoS due to quadratic complexity in ProcessUTF8Portion. (CVE-2021-32617) \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-06-08T19:46:03", "type": "mageia", "title": "Updated exiv2 packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-06-08T19:46:03", "id": "MGASA-2021-0240", "href": "https://advisories.mageia.org/MGASA-2021-0240.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "rocky": [{"lastseen": "2023-12-06T17:28:30", "description": "An update is available for exiv2.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list\nExiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "rocky", "title": "exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-09T08:31:22", "id": "RLSA-2021:4173", "href": "https://errata.rockylinux.org/RLSA-2021:4173", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "almalinux": [{"lastseen": "2023-12-06T17:27:28", "description": "Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "almalinux", "title": "Moderate: exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-12T10:21:01", "id": "ALSA-2021:4173", "href": "https://errata.almalinux.org/8/ALSA-2021-4173.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2023-12-06T20:41:26", "description": "Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "redhat", "title": "(RHSA-2021:4173) Moderate: exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-09T14:11:05", "id": "RHSA-2021:4173", "href": "https://access.redhat.com/errata/RHSA-2021:4173", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2023-06-28T06:34:16", "description": "\nThis update fixes a number of memory access violations and other input\nvalidation failures that can be triggered by passing specially crafted files to\nexiv2.\n\n\n* [CVE-2017-11591](https://security-tracker.debian.org/tracker/CVE-2017-11591)\nThere is a Floating point exception in the `Exiv2::ValueType` function that\n will lead to a remote denial of service attack via crafted input.\n* [CVE-2017-14859](https://security-tracker.debian.org/tracker/CVE-2017-14859)\nAn Invalid memory address dereference was discovered in\n `Exiv2::StringValueBase::read` in `value.cpp`. The vulnerability causes a\n segmentation fault and application crash, which leads to denial of service.\n* [CVE-2017-14862](https://security-tracker.debian.org/tracker/CVE-2017-14862)\nAn Invalid memory address dereference was discovered in\n `Exiv2::DataValue::read` in `value.cpp`. The vulnerability causes a\n segmentation fault and application crash, which leads to denial of service.\n* [CVE-2017-14864](https://security-tracker.debian.org/tracker/CVE-2017-14864)\nAn Invalid memory address dereference was discovered in `Exiv2::getULong` in\n `types.cpp`. The vulnerability causes a segmentation fault and application\n crash, which leads to denial of service.\n* [CVE-2017-17669](https://security-tracker.debian.org/tracker/CVE-2017-17669)\nThere is a heap-based buffer over-read in the\n `Exiv2::Internal::PngChunk::keyTXTChunk` function of `pngchunk_int.cpp`. A\n crafted PNG file will lead to a remote denial of service attack.\n* [CVE-2017-18005](https://security-tracker.debian.org/tracker/CVE-2017-18005)\nExiv2 has a Null Pointer Dereference in the `Exiv2::DataValue::toLong`\n function in `value.cpp`, related to crafted metadata in a TIFF file.\n* [CVE-2018-8976](https://security-tracker.debian.org/tracker/CVE-2018-8976)\n`jpgimage.cpp` allows remote attackers to cause a denial of service\n (`image.cpp` `Exiv2::Internal::stringFormat` out-of-bounds read) via a crafted\n file.\n* [CVE-2018-17581](https://security-tracker.debian.org/tracker/CVE-2018-17581)\n`CiffDirectory::readDirectory()` at `crwimage_int.cpp` has excessive stack\n consumption due to a recursive function, leading to Denial of service.\n* [CVE-2018-19107](https://security-tracker.debian.org/tracker/CVE-2018-19107)\n`Exiv2::IptcParser::decode` in `iptc.cpp` (called from `psdimage.cpp` in the PSD\n image reader) may suffer from a denial of service (heap-based buffer\n over-read) caused by an integer overflow via a crafted PSD image file.\n* [CVE-2018-19108](https://security-tracker.debian.org/tracker/CVE-2018-19108)\n`Exiv2::PsdImage::readMetadata` in `psdimage.cpp` in the PSD image reader may\n suffer from a denial of service (infinite loop) caused by an integer\n overflow via a crafted PSD image file.\n* [CVE-2018-19535](https://security-tracker.debian.org/tracker/CVE-2018-19535)\n`PngChunk::readRawProfile` in `pngchunk_int.cpp` may cause a denial of service\n (application crash due to a heap-based buffer over-read) via a crafted PNG\n file.\n* [CVE-2018-20097](https://security-tracker.debian.org/tracker/CVE-2018-20097)\nThere is a SEGV in `Exiv2::Internal::TiffParserWorker::findPrimaryGroups` of\n `tiffimage_int.cpp`. A crafted input will lead to a remote denial of service\n attack.\n* [CVE-2019-13110](https://security-tracker.debian.org/tracker/CVE-2019-13110)\nA `CiffDirectory::readDirectory` integer overflow and out-of-bounds read\n allows an attacker to cause a denial of service (`SIGSEGV`) via a crafted CRW\n image file.\n* [CVE-2019-13112](https://security-tracker.debian.org/tracker/CVE-2019-13112)\nA `PngChunk::parseChunkContent` uncontrolled memory allocation allows an\n attacker to cause a denial of service (crash due to an `std::bad_alloc`\n exception) via a crafted PNG image file.\n* [CVE-2019-13114](https://security-tracker.debian.org/tracker/CVE-2019-13114)\n`http.c` allows a malicious http server to cause a denial of service (crash\n due to a `NULL` pointer dereference) by returning a crafted response that\n lacks a space character.\n* [CVE-2019-13504](https://security-tracker.debian.org/tracker/CVE-2019-13504)\nThere is an out-of-bounds read in `Exiv2::MrwImage::readMetadata` in\n `mrwimage.cpp`.\n* [CVE-2019-14369](https://security-tracker.debian.org/tracker/CVE-2019-14369)\n`Exiv2::PngImage::readMetadata()` in `pngimage.cpp` allows attackers to cause a\n denial of service (heap-based buffer over- read) via a crafted image file.\n* [CVE-2019-14370](https://security-tracker.debian.org/tracker/CVE-2019-14370)\nThere is an out-of-bounds read in `Exiv2::MrwImage::readMetadata()` in\n `mrwimage.cpp`. It could result in denial of service.\n* [CVE-2019-17402](https://security-tracker.debian.org/tracker/CVE-2019-17402)\nExiv2 allows attackers to trigger a crash in `Exiv2::getULong` in `types.cpp`\n when called from `Exiv2::Internal::CiffDirectory::readDirectory` in\n `crwimage_int.cpp`, because there is no validation of the relationship of the\n total size to the offset and size.\n* [CVE-2020-18771](https://security-tracker.debian.org/tracker/CVE-2020-18771)\nExiv2 has a global buffer over-read in\n `Exiv2::Internal::Nikon1MakerNote::print0x0088` in `nikonmn_int.cpp` which can\n result in an information leak.\n* [CVE-2021-29458](https://security-tracker.debian.org/tracker/CVE-2021-29458)\nAn out-of-bounds read was found in Exiv2. The out-of- bounds read is\n triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the victim into running\n Exiv2 on a crafted image file. Note that this bug is only triggered when\n writing the metadata, which is a less frequently used Exiv2 operation than\n reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument\n such as insert.\n* [CVE-2021-32815](https://security-tracker.debian.org/tracker/CVE-2021-32815)\nThe assertion\n failure is triggered when Exiv2 is used to modify the metadata of a\n crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the\n victim into running Exiv2 on a crafted image file. Note that this bug\n is only triggered when modifying the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you\n need to add an extra command-line argument such as `fi`.\n* [CVE-2021-34334](https://security-tracker.debian.org/tracker/CVE-2021-34334)\nAn infinite loop is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability\n to cause a denial of service, if they can trick the victim into running\n Exiv2 on a crafted image file.\n* [CVE-2021-37620](https://security-tracker.debian.org/tracker/CVE-2021-37620)\nAn out-of-bounds read is triggered when Exiv2 is used to read the metadata\n of a crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the victim\n into running Exiv2 on a crafted image file.\n* [CVE-2021-37621](https://security-tracker.debian.org/tracker/CVE-2021-37621)\nAn infinite loop is triggered when Exiv2 is used to print the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability\n to cause a denial of service, if they can trick the victim into running\n Exiv2 on a crafted image file. Note that this bug is only triggered when\n printing the image ICC profile, which is a less frequently used Exiv2\n operation that requires an extra command line option (`-p C`).\n* [CVE-2021-37622](https://security-tracker.debian.org/tracker/CVE-2021-37622)\nAn infinite loop is triggered when Exiv2 is used to modify the metadata of\n a crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the victim\n into running Exiv2 on a crafted image file. Note that this bug is only\n triggered when deleting the IPTC data, which is a less frequently used\n Exiv2 operation that requires an extra command line option (`-d I rm`).\n\n\nFor Debian 10 buster, these problems have been fixed in version\n0.25-4+deb10u4.\n\n\nWe recommend that you upgrade your exiv2 packages.\n\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\n<https://security-tracker.debian.org/tracker/exiv2>\n\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: <https://wiki.debian.org/LTS>\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.2}, "published": "2023-01-11T00:00:00", "type": "osv", "title": "exiv2 - security update", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-11591", "CVE-2017-14859", "CVE-2017-14862", "CVE-2017-14864", "CVE-2017-17669", "CVE-2017-18005", "CVE-2018-17581", "CVE-2018-19107", "CVE-2018-19108", "CVE-2018-19535", "CVE-2018-20097", "CVE-2018-8976", "CVE-2019-13110", "CVE-2019-13112", "CVE-2019-13114", "CVE-2019-13504", "CVE-2019-14369", "CVE-2019-14370", "CVE-2019-17402", "CVE-2020-18771", "CVE-2021-29458", "CVE-2021-32815", "CVE-2021-34334", "CVE-2021-37620", "CVE-2021-37621", "CVE-2021-37622"], "modified": "2023-06-28T06:33:40", "id": "OSV:DLA-3265-1", "href": "https://osv.dev/vulnerability/DLA-3265-1", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "debian": [{"lastseen": "2023-12-06T16:28:15", "description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-3265-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Helmut Grohne\nJanuary 10, 2023 https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage : exiv2\nVersion : 0.25-4+deb10u4\nCVE ID : CVE-2017-11591 CVE-2017-14859 CVE-2017-14862 CVE-2017-14864\n CVE-2017-17669 CVE-2017-18005 CVE-2018-8976 CVE-2018-17581\n CVE-2018-19107 CVE-2018-19108 CVE-2018-19535 CVE-2018-20097\n CVE-2019-13110 CVE-2019-13112 CVE-2019-13114 CVE-2019-13504\n CVE-2019-14369 CVE-2019-14370 CVE-2019-17402 CVE-2020-18771\n CVE-2021-29458 CVE-2021-32815 CVE-2021-34334 CVE-2021-37620\n CVE-2021-37621 CVE-2021-37622\nDebian Bug : 876893 885981 886006 903813 910060 913272 913273 915135\n 932467 946341 987277 992705 992706\n\nThis update fixes a number of memory access violations and other input\nvalidation failures that can be triggered by passing specially crafted files to\nexiv2.\n\nCVE-2017-11591\n\n There is a Floating point exception in the Exiv2::ValueType function that\n will lead to a remote denial of service attack via crafted input.\n\nCVE-2017-14859\n\n An Invalid memory address dereference was discovered in\n Exiv2::StringValueBase::read in value.cpp. The vulnerability causes a\n segmentation fault and application crash, which leads to denial of service.\n\nCVE-2017-14862\n\n An Invalid memory address dereference was discovered in\n Exiv2::DataValue::read in value.cpp. The vulnerability causes a\n segmentation fault and application crash, which leads to denial of service.\n\nCVE-2017-14864\n\n An Invalid memory address dereference was discovered in Exiv2::getULong in\n types.cpp. The vulnerability causes a segmentation fault and application\n crash, which leads to denial of service.\n\nCVE-2017-17669\n\n There is a heap-based buffer over-read in the\n Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A\n crafted PNG file will lead to a remote denial of service attack.\n\nCVE-2017-18005\n\n Exiv2 has a Null Pointer Dereference in the Exiv2::DataValue::toLong\n function in value.cpp, related to crafted metadata in a TIFF file.\n\nCVE-2018-8976\n\n jpgimage.cpp allows remote attackers to cause a denial of service\n (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted\n file.\n\nCVE-2018-17581\n\n CiffDirectory::readDirectory() at crwimage_int.cpp has excessive stack\n consumption due to a recursive function, leading to Denial of service.\n\nCVE-2018-19107\n\n Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD\n image reader) may suffer from a denial of service (heap-based buffer\n over-read) caused by an integer overflow via a crafted PSD image file.\n\nCVE-2018-19108\n\n Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may\n suffer from a denial of service (infinite loop) caused by an integer\n overflow via a crafted PSD image file.\n\nCVE-2018-19535\n\n PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service\n (application crash due to a heap-based buffer over-read) via a crafted PNG\n file.\n\nCVE-2018-20097\n\n There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of\n tiffimage_int.cpp. A crafted input will lead to a remote denial of service\n attack.\n\nCVE-2019-13110\n\n A CiffDirectory::readDirectory integer overflow and out-of-bounds read\n allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW\n image file.\n\nCVE-2019-13112\n\n A PngChunk::parseChunkContent uncontrolled memory allocation allows an\n attacker to cause a denial of service (crash due to an std::bad_alloc\n exception) via a crafted PNG image file.\n\nCVE-2019-13114\n\n http.c allows a malicious http server to cause a denial of service (crash\n due to a NULL pointer dereference) by returning a crafted response that\n lacks a space character.\n\nCVE-2019-13504\n\n There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in\n mrwimage.cpp.\n\nCVE-2019-14369\n\n Exiv2::PngImage::readMetadata() in pngimage.cpp allows attackers to cause a\n denial of service (heap-based buffer over- read) via a crafted image file.\n\nCVE-2019-14370\n\n There is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in\n mrwimage.cpp. It could result in denial of service.\n\nCVE-2019-17402\n\n Exiv2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp\n when called from Exiv2::Internal::CiffDirectory::readDirectory in\n crwimage_int.cpp, because there is no validation of the relationship of the\n total size to the offset and size.\n\nCVE-2020-18771\n\n Exiv2 has a global buffer over-read in\n Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which can\n result in an information leak.\n\nCVE-2021-29458\n\n An out-of-bounds read was found in Exiv2. The out-of- bounds read is\n triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the victim into running\n Exiv2 on a crafted image file. Note that this bug is only triggered when\n writing the metadata, which is a less frequently used Exiv2 operation than\n reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument\n such as insert.\n\nCVE-2021-32815\n\n The assertion\n failure is triggered when Exiv2 is used to modify the metadata of a\n crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the\n victim into running Exiv2 on a crafted image file. Note that this bug\n is only triggered when modifying the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you\n need to add an extra command-line argument such as `fi`.\n\nCVE-2021-34334\n\n An infinite loop is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability\n to cause a denial of service, if they can trick the victim into running\n Exiv2 on a crafted image file.\n\nCVE-2021-37620\n\n An out-of-bounds read is triggered when Exiv2 is used to read the metadata\n of a crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the victim\n into running Exiv2 on a crafted image file.\n\nCVE-2021-37621\n\n An infinite loop is triggered when Exiv2 is used to print the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability\n to cause a denial of service, if they can trick the victim into running\n Exiv2 on a crafted image file. Note that this bug is only triggered when\n printing the image ICC profile, which is a less frequently used Exiv2\n operation that requires an extra command line option (`-p C`).\n\nCVE-2021-37622\n\n An infinite loop is triggered when Exiv2 is used to modify the metadata of\n a crafted image file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can trick the victim\n into running Exiv2 on a crafted image file. Note that this bug is only\n triggered when deleting the IPTC data, which is a less frequently used\n Exiv2 operation that requires an extra command line option (`-d I rm`).\n\nFor Debian 10 buster, these problems have been fixed in version\n0.25-4+deb10u4.\n\nWe recommend that you upgrade your exiv2 packages.\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/exiv2\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\nAttachment:\nsignature.asc\nDescription: PGP signature\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.2}, "published": "2023-01-10T17:02:40", "type": "debian", "title": "[SECURITY] [DLA 3265-1] exiv2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-11591", "CVE-2017-14859", "CVE-2017-14862", "CVE-2017-14864", "CVE-2017-17669", "CVE-2017-18005", "CVE-2018-17581", "CVE-2018-19107", "CVE-2018-19108", "CVE-2018-19535", "CVE-2018-20097", "CVE-2018-8976", "CVE-2019-13110", "CVE-2019-13112", "CVE-2019-13114", "CVE-2019-13504", "CVE-2019-14369", "CVE-2019-14370", "CVE-2019-17402", "CVE-2020-18771", "CVE-2021-29458", "CVE-2021-32815", "CVE-2021-34334", "CVE-2021-37620", "CVE-2021-37621", "CVE-2021-37622"], "modified": "2023-01-10T17:02:40", "id": "DEBIAN:DLA-3265-1:5DB83", "href": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}]}