Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.
{"id": "CVE-2021-29473", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-29473", "description": "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.", "published": "2021-04-26T19:15:00", "modified": "2023-11-07T03:32:00", "epss": [{"cve": "CVE-2021-29473", "epss": 0.00082, "percentile": 0.34049, "modified": "2023-12-03"}], "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6}, "severity": "LOW", "exploitabilityScore": 4.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 2.5, "baseSeverity": "LOW"}, "exploitabilityScore": 1.0, "impactScore": 1.4}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29473", "reporter": "security-advisories@github.com", "references": ["https://github.com/Exiv2/exiv2/security/policy", "https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2", "https://github.com/github/advisory-review/pull/1587", "https://www.debian.org/security/2021/dsa-4958", "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWZLDECIXXW3CCZ3RS4A3NG5X5VE4WZM/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBKWLTXM7IKZ4PVGKLUQVAVFAYGGF7QR/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/"], "cvelist": ["CVE-2021-29473"], "immutableFields": [], "lastseen": "2023-12-03T15:07:24", "viewCount": 164, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:4173"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-29473"]}, {"type": "archlinux", "idList": ["ASA-202106-54"]}, {"type": "cbl_mariner", "idList": ["CBLMARINER:7211"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2750-1:0036D", "DEBIAN:DLA-2750-1:F28B2", "DEBIAN:DSA-4958-1:700B1"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-29473"]}, {"type": "fedora", "idList": ["FEDORA:22782304C684", "FEDORA:75D2C307F954", "FEDORA:C905730E433E", "FEDORA:DDAA730A2797"]}, {"type": "freebsd", "idList": ["D49F86AB-D9C7-11EB-A200-00155D01F201"]}, {"type": "mageia", "idList": ["MGASA-2021-0240"]}, {"type": "nessus", "idList": ["ALMA_LINUX_ALSA-2021-4173.NASL", "CENTOS8_RHSA-2021-4173.NASL", "DEBIAN_DLA-2750.NASL", "DEBIAN_DSA-4958.NASL", "EULEROS_SA-2021-2367.NASL", "EULEROS_SA-2021-2579.NASL", "FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "NEWSTART_CGSL_NS-SA-2022-0090_EXIV2.NASL", "REDHAT-RHSA-2021-4173.NASL", "ROCKY_LINUX_RLSA-2021-4173.NASL", "SUSE_SU-2022-4208-1.NASL", "SUSE_SU-2022-4252-1.NASL", "SUSE_SU-2022-4276-1.NASL", "UBUNTU_USN-4964-1.NASL"]}, {"type": "osv", "idList": ["OSV:DLA-2750-1", "OSV:DSA-4958-1"]}, {"type": "prion", "idList": ["PRION:CVE-2021-29473"]}, {"type": "redhat", "idList": ["RHSA-2021:4173"]}, {"type": "redhatcve", "idList": ["RH:CVE-2021-29473"]}, {"type": "rocky", "idList": ["RLSA-2021:4173"]}, {"type": "ubuntu", "idList": ["USN-4964-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-29473"]}, {"type": "veracode", "idList": ["VERACODE:30769"]}]}, "score": {"value": 5.1, "uncertanity": 0.9, "vector": "NONE"}, "twitter": {"counter": 8, "modified": "2021-08-15T07:54:22", "tweets": [{"link": "https://twitter.com/management_sun/status/1427074008395042823", "text": "IT Risk:Debian:exiv2\u306b\u8907\u6570\u306e\u8106\u5f31\u6027\nDebian GNU/Linux\nCVE-2021-31292 CVE-2021-29473 CVE-2021-29457 CVE-2021-3482 CVE-2019-20421 \nhttps://t.co/vjDIPaITKx?amp=1\nhttps://t.co/A58rK3RJsq?amp=1"}, {"link": "https://twitter.com/management_sun/status/1427074037746868228", "text": "IT Risk:Debian: Multiple vulnerabilities in exiv2\nDebian GNU/Linux\nCVE-2021-31292 CVE-2021-29473 CVE-2021-29457 CVE-2021-3482 CVE-2019-20421 \nhttps://t.co/vjDIPaITKx?amp=1\nhttps://t.co/A58rK3RJsq?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1393831180273737730", "text": " NEW: CVE-2021-29473 Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earl... (click for more) Severity: LOW https://t.co/9ik5tegRpL?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1393725480738639874", "text": " NEW: CVE-2021-29473 Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earl... (click for more) Severity: LOW https://t.co/9ik5tdZgyd?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1393725480738639874", "text": " NEW: CVE-2021-29473 Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earl... (click for more) Severity: LOW https://t.co/9ik5tdZgyd?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1426566892693643267", "text": " NEW: CVE-2021-29473 Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earl... (click for more) Severity: LOW https://t.co/9ik5tdZgyd?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1393906680799371265", "text": " NEW: CVE-2021-29473 Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earl... (click for more) Severity: LOW https://t.co/9ik5tdZgyd?amp=1"}, {"link": "https://twitter.com/VulmonFeeds/status/1407284249254940674", "text": "CVE-2021-29473\n\nExiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exi...\n\nhttps://t.co/XbJYxxrbIM?amp=1"}]}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:4173"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-29473"]}, {"type": "archlinux", "idList": ["ASA-202106-54"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2750-1:0036D", "DEBIAN:DSA-4958-1:700B1"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-29473"]}, {"type": "fedora", "idList": ["FEDORA:22782304C684"]}, {"type": "freebsd", "idList": ["D49F86AB-D9C7-11EB-A200-00155D01F201"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-4958.NASL", "FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "UBUNTU_USN-4964-1.NASL"]}, {"type": "redhat", "idList": ["RHSA-2021:4173"]}, {"type": "redhatcve", "idList": ["RH:CVE-2021-29473"]}, {"type": "ubuntu", "idList": ["USN-4964-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-29473"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "exiv2", "version": 0}, {"name": "fedoraproject fedora", "version": 33}, {"name": "fedoraproject fedora", "version": 3334}, {"name": "debian debian linux", "version": 9}, {"name": "debian debian linux", "version": 10}]}, "epss": [{"cve": "CVE-2021-29473", "epss": 0.00075, "percentile": 0.30681, "modified": "2023-05-07"}], "short_description": "Exiv2 C++ library & command-line utility for image metadata manipulation. Out-of-bounds read in v0.27.3 & earlier. Fixed in v0.27.4", "tags": ["exiv2", "c++", "command-line utility", "image metadata", "out-of-bounds read", "vulnerability", "security advisory"], "vulnersScore": 5.1}, "_state": {"dependencies": 1701618697, "score": 1701616085, "affected_software_major_version": 0, "epss": 0, "chatgpt": 0}, "_internal": {"score_hash": "3e02b83157299c3768e417f7be562b36", "chatgpt": "bcd8b0c2eb1fce714eab6cef0d771acc"}, "cna_cvss": {"cna": "GitHub_M", "cvss": {"3": {"vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "score": 2.5}}}, "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:fedoraproject:fedora:33", "cpe:/o:fedoraproject:fedora:3334"], "cpe23": ["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:3334:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"], "cwe": ["CWE-125"], "affectedSoftware": [{"cpeName": "exiv2:exiv2", "version": "0.27.4", "operator": "lt", "name": "exiv2"}, {"cpeName": "fedoraproject:fedora", "version": "33", "operator": "eq", "name": "fedoraproject fedora"}, {"cpeName": "fedoraproject:fedora", "version": "3334", "operator": "eq", "name": "fedoraproject fedora"}, {"cpeName": "debian:debian_linux", "version": "9.0", "operator": "eq", "name": "debian debian linux"}, {"cpeName": "debian:debian_linux", "version": "10.0", "operator": "eq", "name": "debian debian linux"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:exiv2:exiv2:0.27.4:*:*:*:*:*:*:*", "versionEndExcluding": "0.27.4", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:3334:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/Exiv2/exiv2/security/policy", "name": "https://github.com/Exiv2/exiv2/security/policy", "refsource": "MISC", "tags": ["Release Notes", "Third Party Advisory"]}, {"url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2", "name": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2", "refsource": "CONFIRM", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://github.com/github/advisory-review/pull/1587", "name": "https://github.com/github/advisory-review/pull/1587", "refsource": "MISC", "tags": ["Broken Link", "Third Party Advisory"]}, {"url": "https://www.debian.org/security/2021/dsa-4958", "name": "DSA-4958", "refsource": "DEBIAN", "tags": ["Third Party Advisory"]}, {"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html", "name": "[debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update", "refsource": "MLIST", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "name": "FEDORA-2021-10d7331a31", "refsource": "", "tags": []}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWZLDECIXXW3CCZ3RS4A3NG5X5VE4WZM/", "name": "FEDORA-2021-2d860da728", "refsource": "", "tags": []}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBKWLTXM7IKZ4PVGKLUQVAVFAYGGF7QR/", "name": "FEDORA-2021-96a5dabcfa", "refsource": "", "tags": []}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/", "name": "FEDORA-2021-be94728b95", "refsource": "", "tags": []}], "product_info": [{"vendor": "Exiv2", "product": "exiv2"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"cweId": "CWE-125", "description": "{\"CWE-125\":\"Out-of-bounds Read\"}", "lang": "en", "type": "CWE"}]}], "exploits": [], "assigned": "2021-03-30T00:00:00"}
{"ubuntucve": [{"lastseen": "2023-12-03T13:53:40", "description": "Exiv2 is a C++ library and a command-line utility to read, write, delete\nand modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read\nwas found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line\nutility and C++ library for reading, writing, deleting, and modifying the\nmetadata of image files. The out-of-bounds read is triggered when Exiv2 is\nused to write metadata into a crafted image file. An attacker could\npotentially exploit the vulnerability to cause a denial of service by\ncrashing Exiv2, if they can trick the victim into running Exiv2 on a\ncrafted image file. Note that this bug is only triggered when writing the\nmetadata, which is a less frequently used Exiv2 operation than reading the\nmetadata. For example, to trigger the bug in the Exiv2 command-line\napplication, you need to add an extra command-line argument such as\n`insert`. The bug is fixed in version v0.27.4. Please see our security\npolicy for information about Exiv2 security.\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987736>\n", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-04-26T00:00:00", "type": "ubuntucve", "title": "CVE-2021-29473", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2021-04-26T00:00:00", "id": "UB:CVE-2021-29473", "href": "https://ubuntu.com/security/CVE-2021-29473", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "cbl_mariner": [{"lastseen": "2023-12-03T15:17:33", "description": "CVE-2021-29473 affecting package exiv2 0.27.2-3. An upgraded version of the package is available that resolves this issue.", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2022-06-25T20:53:09", "type": "cbl_mariner", "title": "CVE-2021-29473 affecting package exiv2 0.27.2-3", "bulletinFamily": "unix", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2022-06-25T20:53:09", "id": "CBLMARINER:7211", "href": "", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "debiancve": [{"lastseen": "2023-12-03T15:20:39", "description": "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-04-26T19:15:00", "type": "debiancve", "title": "CVE-2021-29473", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2021-04-26T19:15:00", "id": "DEBIANCVE:CVE-2021-29473", "href": "https://security-tracker.debian.org/tracker/CVE-2021-29473", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "veracode": [{"lastseen": "2022-07-26T16:56:27", "description": "Exiv2 is vulnerable to denial of service. The vulnerability exists due to an out of bounds read. \n", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-06-01T09:19:53", "type": "veracode", "title": "Denial Of Service (DoS)", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2021-06-02T16:31:57", "id": "VERACODE:30769", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-30769/summary", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "prion": [{"lastseen": "2023-11-22T00:46:38", "description": "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.", "cvss3": {"cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}}, "published": "2021-04-26T19:15:00", "type": "prion", "title": "Design/Logic Flaw", "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 1.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 1.2, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2021-09-21T18:12:00", "id": "PRION:CVE-2021-29473", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2021-29473", "cvss": {"score": 1.2, "vector": "AV:L/AC:H/Au:N/C:N/I:N/A:P"}}], "redhatcve": [{"lastseen": "2023-12-03T20:50:20", "description": "A flaw was found in exiv2. An out-of-bounds read in the Exiv2::Jp2Image::doWriteMetadata function may allow a remote attacker to crash an application using exiv2 library. The highest threat from this vulnerability is to application availability.\n", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-04-27T14:15:34", "type": "redhatcve", "title": "CVE-2021-29473", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2023-04-06T08:02:06", "id": "RH:CVE-2021-29473", "href": "https://access.redhat.com/security/cve/cve-2021-29473", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "alpinelinux": [{"lastseen": "2023-12-03T16:03:11", "description": "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security.", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "LOW", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-04-26T19:15:00", "type": "alpinelinux", "title": "CVE-2021-29473", "bulletinFamily": "unix", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473"], "modified": "2023-11-07T03:32:00", "id": "ALPINE:CVE-2021-29473", "href": "https://security.alpinelinux.org/vuln/CVE-2021-29473", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}], "fedora": [{"lastseen": "2023-12-03T19:08:34", "description": "MinGW Windows exiv2 library. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-05-10T01:07:02", "type": "fedora", "title": "[SECURITY] Fedora 34 Update: mingw-exiv2-0.27.3-5.fc34", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29470", "CVE-2021-29473"], "modified": "2021-05-10T01:07:02", "id": "FEDORA:75D2C307F954", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JWZLDECIXXW3CCZ3RS4A3NG5X5VE4WZM/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-12-03T19:08:34", "description": "MinGW Windows exiv2 library. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-05-10T01:08:51", "type": "fedora", "title": "[SECURITY] Fedora 33 Update: mingw-exiv2-0.27.3-5.fc33", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29470", "CVE-2021-29473"], "modified": "2021-05-10T01:08:51", "id": "FEDORA:DDAA730A2797", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LBKWLTXM7IKZ4PVGKLUQVAVFAYGGF7QR/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-12-03T19:08:33", "description": "A command line utility to access image metadata, allowing one to: * print the Exif metadata of Jpeg images as summary info, interpreted value s, or the plain data for each tag * print the Iptc metadata of Jpeg images * print the Jpeg comment of Jpeg images * set, add and delete Exif and Iptc metadata of Jpeg images * adjust the Exif timestamp (that's how it all started...) * rename Exif image files according to the Exif timestamp * extract, insert and delete Exif metadata (including thumbnails), Iptc metadata and Jpeg comments ", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-04T01:01:31", "type": "fedora", "title": "[SECURITY] Fedora 34 Update: exiv2-0.27.3-6.fc34", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-3482"], "modified": "2021-05-04T01:01:31", "id": "FEDORA:22782304C684", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-12-03T19:08:34", "description": "A command line utility to access image metadata, allowing one to: * print the Exif metadata of Jpeg images as summary info, interpreted value s, or the plain data for each tag * print the Iptc metadata of Jpeg images * print the Jpeg comment of Jpeg images * set, add and delete Exif and Iptc metadata of Jpeg images * adjust the Exif timestamp (that's how it all started...) * rename Exif image files according to the Exif timestamp * extract, insert and delete Exif metadata (including thumbnails), Iptc metadata and Jpeg comments ", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-14T21:12:27", "type": "fedora", "title": "[SECURITY] Fedora 33 Update: exiv2-0.27.3-6.fc33", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-3482"], "modified": "2021-05-14T21:12:27", "id": "FEDORA:C905730E433E", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-05-18T15:32:08", "description": "The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-4958 advisory.\n\n - In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. (CVE-2019-20421)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-08-14T00:00:00", "type": "nessus", "title": "Debian DSA-4958-1 : exiv2 - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20421", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31292", "CVE-2021-3482"], "modified": "2021-08-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:exiv2", "p-cpe:/a:debian:debian_linux:libexiv2-14", "p-cpe:/a:debian:debian_linux:libexiv2-dev", "p-cpe:/a:debian:debian_linux:libexiv2-doc", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4958.NASL", "href": "https://www.tenable.com/plugins/nessus/152565", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dsa-4958. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152565);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/08/14\");\n\n script_cve_id(\n \"CVE-2019-20421\",\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29473\",\n \"CVE-2021-31292\"\n );\n\n script_name(english:\"Debian DSA-4958-1 : exiv2 - security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndsa-4958 advisory.\n\n - In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop\n and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial\n of service via a crafted file. (CVE-2019-20421)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/exiv2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/security/2021/dsa-4958\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-20421\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/buster/exiv2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the exiv2 packages.\n\nFor the stable distribution (buster), these problems have been fixed in version 0.25-4+deb10u2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/08/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/08/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar release = get_kb_item('Host/Debian/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');\nvar release = chomp(release);\nif (! preg(pattern:\"^(10)\\.[0-9]+\", string:release)) audit(AUDIT_OS_NOT, 'Debian 10.0', 'Debian ' + release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '10.0', 'prefix': 'exiv2', 'reference': '0.25-4+deb10u2'},\n {'release': '10.0', 'prefix': 'libexiv2-14', 'reference': '0.25-4+deb10u2'},\n {'release': '10.0', 'prefix': 'libexiv2-dev', 'reference': '0.25-4+deb10u2'},\n {'release': '10.0', 'prefix': 'libexiv2-doc', 'reference': '0.25-4+deb10u2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (release && prefix && reference) {\n if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / libexiv2-14 / libexiv2-dev / libexiv2-doc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-21T16:21:46", "description": "The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-4964-1 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. (CVE-2021-29623)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-25T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS : Exiv2 vulnerabilities (USN-4964-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617"], "modified": "2023-10-20T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:esm", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:exiv2", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-14", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-27", "p-cpe:/a:canonical:ubuntu_linux:libexiv2-dev"], "id": "UBUNTU_USN-4964-1.NASL", "href": "https://www.tenable.com/plugins/nessus/149906", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4964-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149906);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-32617\"\n );\n script_xref(name:\"USN\", value:\"4964-1\");\n\n script_name(english:\"Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS : Exiv2 vulnerabilities (USN-4964-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 / 21.04 host has packages installed that are affected by\nmultiple vulnerabilities as referenced in the USN-4964-1 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2\n is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of\n image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack\n memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in\n version v0.27.4. (CVE-2021-29623)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4964-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-27\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libexiv2-dev\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2021-2023 Canonical, Inc. / NASL script (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release || '20.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04 / 20.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'exiv2', 'pkgver': '0.25-2.1ubuntu16.04.7+esm2'},\n {'osver': '16.04', 'pkgname': 'libexiv2-14', 'pkgver': '0.25-2.1ubuntu16.04.7+esm2'},\n {'osver': '16.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.25-2.1ubuntu16.04.7+esm2'},\n {'osver': '18.04', 'pkgname': 'exiv2', 'pkgver': '0.25-3.1ubuntu0.18.04.9'},\n {'osver': '18.04', 'pkgname': 'libexiv2-14', 'pkgver': '0.25-3.1ubuntu0.18.04.9'},\n {'osver': '18.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.25-3.1ubuntu0.18.04.9'},\n {'osver': '20.04', 'pkgname': 'exiv2', 'pkgver': '0.27.2-8ubuntu2.4'},\n {'osver': '20.04', 'pkgname': 'libexiv2-27', 'pkgver': '0.27.2-8ubuntu2.4'},\n {'osver': '20.04', 'pkgname': 'libexiv2-dev', 'pkgver': '0.27.2-8ubuntu2.4'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / libexiv2-14 / libexiv2-27 / libexiv2-dev');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-02T16:22:15", "description": "The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-2750 advisory.\n\n - In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. (CVE-2019-20421)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-08-30T00:00:00", "type": "nessus", "title": "Debian DLA-2750-1 : exiv2 - LTS security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20421", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-3482"], "modified": "2023-12-01T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:exiv2", "p-cpe:/a:debian:debian_linux:libexiv2-14", "p-cpe:/a:debian:debian_linux:libexiv2-dbg", "p-cpe:/a:debian:debian_linux:libexiv2-dev", "p-cpe:/a:debian:debian_linux:libexiv2-doc", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2750.NASL", "href": "https://www.tenable.com/plugins/nessus/152899", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dla-2750. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152899);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/12/01\");\n\n script_cve_id(\n \"CVE-2019-20421\",\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29473\",\n \"CVE-2021-31291\",\n \"CVE-2021-31292\"\n );\n\n script_name(english:\"Debian DLA-2750-1 : exiv2 - LTS security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndla-2750 advisory.\n\n - In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop\n and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial\n of service via a crafted file. (CVE-2019-20421)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a\n duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this\n candidate. All references and descriptions in this candidate have been removed to prevent accidental\n usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/exiv2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/lts/security/2021/dla-2750\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-20421\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-31291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/stretch/exiv2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the exiv2 packages.\n\nFor Debian 9 stretch, these problems have been fixed in version 0.25-3.1+deb9u3.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/08/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/08/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libexiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar release = get_kb_item('Host/Debian/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');\nvar release = chomp(release);\nif (! preg(pattern:\"^(9)\\.[0-9]+\", string:release)) audit(AUDIT_OS_NOT, 'Debian 9.0', 'Debian ' + release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '9.0', 'prefix': 'exiv2', 'reference': '0.25-3.1+deb9u3'},\n {'release': '9.0', 'prefix': 'libexiv2-14', 'reference': '0.25-3.1+deb9u3'},\n {'release': '9.0', 'prefix': 'libexiv2-dbg', 'reference': '0.25-3.1+deb9u3'},\n {'release': '9.0', 'prefix': 'libexiv2-dev', 'reference': '0.25-3.1+deb9u3'},\n {'release': '9.0', 'prefix': 'libexiv2-doc', 'reference': '0.25-3.1+deb9u3'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (release && prefix && reference) {\n if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / libexiv2-14 / libexiv2-dbg / libexiv2-dev / libexiv2-doc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:37:20", "description": "According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-10-25T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : exiv2 (EulerOS-SA-2021-2579)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-32617"], "modified": "2023-11-29T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2579.NASL", "href": "https://www.tenable.com/plugins/nessus/154372", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(154372);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/29\");\n\n script_cve_id(\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29473\",\n \"CVE-2021-31291\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : exiv2 (EulerOS-SA-2021-2579)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a\n duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this\n candidate. All references and descriptions in this candidate have been removed to prevent accidental\n usage. (CVE-2021-31291)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security\nadvisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional\nissues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2579\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8fa50dac\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/10/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nvar uvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nvar sp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nvar flag = 0;\n\nvar pkgs = [\n \"exiv2-libs-0.23-6.h13\"\n];\n\nforeach (var pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-10T01:03:54", "description": "The remote SUSE Linux SLES12 / SLES_SAP12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4252-1 advisory.\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.\n (CVE-2019-13112)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-29T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : exiv2 (SUSE-SU-2022:4252-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-20097", "CVE-2019-13112", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-32815", "CVE-2021-34334", "CVE-2021-37620"], "modified": "2023-11-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libexiv2-12", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2022-4252-1.NASL", "href": "https://www.tenable.com/plugins/nessus/168254", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:4252-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(168254);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/09\");\n\n script_cve_id(\n \"CVE-2018-20097\",\n \"CVE-2019-13112\",\n \"CVE-2021-29457\",\n \"CVE-2021-29473\",\n \"CVE-2021-31291\",\n \"CVE-2021-32815\",\n \"CVE-2021-34334\",\n \"CVE-2021-37620\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:4252-1\");\n\n script_name(english:\"SUSE SLES12 Security Update : exiv2 (SUSE-SU-2022:4252-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLES12 / SLES_SAP12 host has a package installed that is affected by multiple vulnerabilities as\nreferenced in the SUSE-SU-2022:4252-1 advisory.\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to\n cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.\n (CVE-2019-13112)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted\n image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they\n can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when\n modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and\n bug fix: #1739 ### For more information Please see our [security\n policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119562\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1142681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1185002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1188733\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189338\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13112\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-31291\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-32815\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-34334\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-37620\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d83830e7\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected libexiv2-12 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29457\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libexiv2-12\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(os_release) || os_release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)(?:_SAP)?\\d+)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12|SLES_SAP12)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES12 / SLES_SAP12', 'SUSE (' + os_ver + ')');\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);\n\nvar service_pack = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(service_pack)) service_pack = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLES_SAP12\" && (! preg(pattern:\"^(4|5)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES_SAP12 SP4/5\", os_ver + \" SP\" + service_pack);\n\nvar pkgs = [\n {'reference':'libexiv2-12-0.23-12.18.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.4']},\n {'reference':'libexiv2-12-0.23-12.18.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},\n {'reference':'libexiv2-12-0.23-12.18.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && _release) {\n if (exists_check) {\n var check_flag = 0;\n foreach var check (exists_check) {\n if (!rpm_exists(release:_release, rpm:check)) continue;\n check_flag++;\n }\n if (!check_flag) continue;\n }\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libexiv2-12');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-12-01T15:19:02", "description": "According to the versions of the exiv2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.(CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.(CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file.(CVE-2021-32617)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.(CVE-2019-17402)\n\n - Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.(CVE-2018-16336)\n\n - Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.(CVE-2018-19607)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp.(CVE-2018-11531)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-09-14T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP2 : exiv2 (EulerOS-SA-2021-2367)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10999", "CVE-2018-11531", "CVE-2018-16336", "CVE-2018-19607", "CVE-2019-17402", "CVE-2021-29458", "CVE-2021-29473", "CVE-2021-32617"], "modified": "2023-11-30T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:exiv2-libs", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2367.NASL", "href": "https://www.tenable.com/plugins/nessus/153280", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153280);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/30\");\n\n script_cve_id(\n \"CVE-2018-11531\",\n \"CVE-2018-16336\",\n \"CVE-2018-19607\",\n \"CVE-2019-17402\",\n \"CVE-2021-29458\",\n \"CVE-2021-29473\",\n \"CVE-2021-32617\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : exiv2 (EulerOS-SA-2021-2367)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the exiv2 package installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata\n into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial\n of service by crashing Exiv2, if they can trick the\n victim into running Exiv2 on a crafted image file. Note\n that this bug is only triggered when writing the\n metadata, which is a less frequently used Exiv2\n operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application,\n you need to add an extra command-line argument such as\n insert.(CVE-2021-29458)\n\n - Exiv2 is a C++ library and a command-line utility to\n read, write, delete and modify Exif, IPTC, XMP and ICC\n image metadata. An out-of-bounds read was found in\n Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading,\n writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2\n is used to write metadata into a crafted image file. An\n attacker could potentially exploit the vulnerability to\n cause a denial of service by crashing Exiv2, if they\n can trick the victim into running Exiv2 on a crafted\n image file. Note that this bug is only triggered when\n writing the metadata, which is a less frequently used\n Exiv2 operation than reading the metadata. For example,\n to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line\n argument such as `insert`.(CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for\n reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic\n complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when\n Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the\n vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image\n file.(CVE-2021-32617)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in\n Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in\n crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and\n size.(CVE-2019-17402)\n\n - Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26\n allows remote attackers to cause a denial of service\n (heap-based buffer over-read) via a crafted image file,\n a different vulnerability than\n CVE-2018-10999.(CVE-2018-16336)\n\n - Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2\n allows remote attackers to cause a denial of service\n (NULL pointer dereference and application crash) via a\n crafted file.(CVE-2018-19607)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData\n in preview.cpp.(CVE-2018-11531)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2367\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5015edaf\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected exiv2 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-11531\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/09/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"exiv2-libs-0.23-6.h8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"exiv2\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:31:59", "description": "Exiv2 teams reports :\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds, read of uninitialized memory and denial of serivce. The heap overflow is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file.", "cvss3": {}, "published": "2021-07-06T00:00:00", "type": "nessus", "title": "FreeBSD : Exiv2 -- Multiple vulnerabilities (d49f86ab-d9c7-11eb-a200-00155d01f201)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-07-08T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:exiv2", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_D49F86ABD9C711EBA20000155D01F201.NASL", "href": "https://www.tenable.com/plugins/nessus/151377", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(151377);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/08\");\n\n script_cve_id(\"CVE-2021-29457\", \"CVE-2021-29458\", \"CVE-2021-29463\", \"CVE-2021-29464\", \"CVE-2021-29470\", \"CVE-2021-29473\", \"CVE-2021-29623\", \"CVE-2021-32617\", \"CVE-2021-3482\");\n\n script_name(english:\"FreeBSD : Exiv2 -- Multiple vulnerabilities (d49f86ab-d9c7-11eb-a200-00155d01f201)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Exiv2 teams reports :\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds,\nread of uninitialized memory and denial of serivce. The heap overflow\nis triggered when Exiv2 is used to read the metadata of a crafted\nimage file. An attacker could potentially exploit the vulnerability to\ngain code execution, if they can trick the victim into running Exiv2\non a crafted image file. The out-of-bounds read is triggered when\nExiv2 is used to write metadata into a crafted image file. An attacker\ncould potentially exploit the vulnerability to cause a denial of\nservice by crashing Exiv2, if they can trick the victim into running\nExiv2 on a crafted image file. The read of uninitialized memory is\ntriggered when Exiv2 is used to read the metadata of a crafted image\nfile. An attacker could potentially exploit the vulnerability to leak\na few bytes of stack memory, if they can trick the victim into running\nExiv2 on a crafted image file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9\"\n );\n # https://vuxml.freebsd.org/freebsd/d49f86ab-d9c7-11eb-a200-00155d01f201.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?062220b4\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"exiv2<0.27.4,1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-14T19:00:55", "description": "The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4208-1 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp. (CVE-2018-11531)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20098)\n\n - There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20099)\n\n - An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n (CVE-2019-13109)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-24T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : exiv2-0_26 (SUSE-SU-2022:4208-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-11591", "CVE-2018-11531", "CVE-2018-17581", "CVE-2018-20097", "CVE-2018-20098", "CVE-2018-20099", "CVE-2019-13109", "CVE-2019-13110", "CVE-2019-17402", "CVE-2021-29473", "CVE-2021-32815"], "modified": "2023-07-14T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libexiv2-26", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2022-4208-1.NASL", "href": "https://www.tenable.com/plugins/nessus/168169", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:4208-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(168169);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/07/14\");\n\n script_cve_id(\n \"CVE-2017-11591\",\n \"CVE-2018-11531\",\n \"CVE-2018-17581\",\n \"CVE-2018-20097\",\n \"CVE-2018-20098\",\n \"CVE-2018-20099\",\n \"CVE-2019-13109\",\n \"CVE-2019-13110\",\n \"CVE-2019-17402\",\n \"CVE-2021-29473\",\n \"CVE-2021-32815\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:4208-1\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : exiv2-0_26 (SUSE-SU-2022:4208-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has a package installed that is affected by\nmultiple vulnerabilities as referenced in the SUSE-SU-2022:4208-1 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a\n remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp. (CVE-2018-11531)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a\n recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20098)\n\n - There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted\n input will lead to a remote denial of service attack. (CVE-2018-20099)\n\n - An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via\n a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n (CVE-2019-13109)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an\n attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted\n image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they\n can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when\n modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and\n bug fix: #1739 ### For more information Please see our [security\n policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1050257\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1095070\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1110282\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119559\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119560\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119562\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1142677\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1142678\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1153577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-11591\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-11531\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-17581\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13109\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13110\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-17402\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-32815\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fc474636\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected libexiv2-26 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-11531\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libexiv2-26\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(os_release) || os_release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)(?:_SAP)?\\d+)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);\n\nvar service_pack = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(service_pack)) service_pack = \"0\";\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(4)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLED15 SP4\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLED_SAP15\" && (! preg(pattern:\"^(4)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLED_SAP15 SP4\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(4)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES15 SP4\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLES_SAP15\" && (! preg(pattern:\"^(4)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES_SAP15 SP4\", os_ver + \" SP\" + service_pack);\n\nvar pkgs = [\n {'reference':'libexiv2-26-0.26-150400.9.21.1', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},\n {'reference':'libexiv2-26-0.26-150400.9.21.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},\n {'reference':'libexiv2-26-0.26-150400.9.21.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-desktop-applications-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},\n {'reference':'libexiv2-26-0.26-150400.9.21.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-desktop-applications-release-15.4', 'sled-release-15.4', 'sles-release-15.4']}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && _release) {\n if (exists_check) {\n var check_flag = 0;\n foreach var check (exists_check) {\n if (!rpm_exists(release:_release, rpm:check)) continue;\n check_flag++;\n }\n if (!check_flag) continue;\n }\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libexiv2-26');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-12T13:31:05", "description": "The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:4173 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-11-06T00:00:00", "type": "nessus", "title": "Rocky Linux 8 : exiv2 (RLSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-06T00:00:00", "cpe": ["p-cpe:/a:rocky:linux:exiv2", "p-cpe:/a:rocky:linux:exiv2-debuginfo", "p-cpe:/a:rocky:linux:exiv2-debugsource", "p-cpe:/a:rocky:linux:exiv2-devel", "p-cpe:/a:rocky:linux:exiv2-doc", "p-cpe:/a:rocky:linux:exiv2-libs", "p-cpe:/a:rocky:linux:exiv2-libs-debuginfo", "cpe:/o:rocky:linux:8"], "id": "ROCKY_LINUX_RLSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/184583", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# Rocky Linux Security Advisory RLSA-2021:4173.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(184583);\n script_version(\"1.0\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/06\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RLSA\", value:\"2021:4173\");\n\n script_name(english:\"Rocky Linux 8 : exiv2 (RLSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Rocky Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nRLSA-2021:4173 advisory.\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2\n is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of\n image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack\n memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in\n version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into\n running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC\n profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p\n C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://errata.rockylinux.org/RLSA-2021:4173\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1946314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1952607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1952612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1953708\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1954065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1961650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1961691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1978100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1978105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1989860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1990330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1992165\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1992174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/11/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:rocky:linux:exiv2-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:rocky:linux:8\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Rocky Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RockyLinux/release\", \"Host/RockyLinux/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RockyLinux/release');\nif (isnull(os_release) || 'Rocky Linux' >!< os_release) audit(AUDIT_OS_NOT, 'Rocky Linux');\nvar os_ver = pregmatch(pattern: \"Rocky(?: Linux)? release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Rocky Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Rocky Linux 8.x', 'Rocky Linux ' + os_ver);\n\nif (!get_kb_item('Host/RockyLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Rocky Linux', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debuginfo-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debugsource-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-debugsource-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-debuginfo-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = 'Rocky-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-debuginfo / exiv2-debugsource / exiv2-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:38:42", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-11-11T00:00:00", "type": "nessus", "title": "RHEL 8 : exiv2 (RHSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-24T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:exiv2", "p-cpe:/a:redhat:enterprise_linux:exiv2-devel", "p-cpe:/a:redhat:enterprise_linux:exiv2-doc", "p-cpe:/a:redhat:enterprise_linux:exiv2-libs"], "id": "REDHAT-RHSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/155217", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2021:4173. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155217);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/24\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RHSA\", value:\"2021:4173\");\n\n script_name(english:\"RHEL 8 : exiv2 (RHSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS\n (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29463\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29464\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29470\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-29623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-32617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-37618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-37619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:4173\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1946314\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1952607\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1952612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1953708\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1954065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1961650\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1961691\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1978100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1978105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1990330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1992165\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1992174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 119, 120, 125, 190, 400, 704, 787, 908);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:exiv2-libs\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/appstream/debug',\n 'content/eus/rhel8/8.6/aarch64/appstream/os',\n 'content/eus/rhel8/8.6/aarch64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/baseos/debug',\n 'content/eus/rhel8/8.6/aarch64/baseos/os',\n 'content/eus/rhel8/8.6/aarch64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/os',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/highavailability/debug',\n 'content/eus/rhel8/8.6/aarch64/highavailability/os',\n 'content/eus/rhel8/8.6/aarch64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/supplementary/debug',\n 'content/eus/rhel8/8.6/aarch64/supplementary/os',\n 'content/eus/rhel8/8.6/aarch64/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/appstream/debug',\n 'content/eus/rhel8/8.6/ppc64le/appstream/os',\n 'content/eus/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/baseos/debug',\n 'content/eus/rhel8/8.6/ppc64le/baseos/os',\n 'content/eus/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/debug',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/os',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/os',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/debug',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/os',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap/os',\n 'content/eus/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/debug',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/os',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/appstream/debug',\n 'content/eus/rhel8/8.6/s390x/appstream/os',\n 'content/eus/rhel8/8.6/s390x/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/baseos/debug',\n 'content/eus/rhel8/8.6/s390x/baseos/os',\n 'content/eus/rhel8/8.6/s390x/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/debug',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/os',\n 'content/eus/rhel8/8.6/s390x/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/highavailability/debug',\n 'content/eus/rhel8/8.6/s390x/highavailability/os',\n 'content/eus/rhel8/8.6/s390x/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/debug',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/os',\n 'content/eus/rhel8/8.6/s390x/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/sap/debug',\n 'content/eus/rhel8/8.6/s390x/sap/os',\n 'content/eus/rhel8/8.6/s390x/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/s390x/supplementary/debug',\n 'content/eus/rhel8/8.6/s390x/supplementary/os',\n 'content/eus/rhel8/8.6/s390x/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'exiv2-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/aarch64/appstream/debug',\n 'content/dist/rhel8/8/aarch64/appstream/os',\n 'content/dist/rhel8/8/aarch64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/baseos/debug',\n 'content/dist/rhel8/8/aarch64/baseos/os',\n 'content/dist/rhel8/8/aarch64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/codeready-builder/debug',\n 'content/dist/rhel8/8/aarch64/codeready-builder/os',\n 'content/dist/rhel8/8/aarch64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/highavailability/debug',\n 'content/dist/rhel8/8/aarch64/highavailability/os',\n 'content/dist/rhel8/8/aarch64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/supplementary/debug',\n 'content/dist/rhel8/8/aarch64/supplementary/os',\n 'content/dist/rhel8/8/aarch64/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/appstream/debug',\n 'content/dist/rhel8/8/ppc64le/appstream/os',\n 'content/dist/rhel8/8/ppc64le/appstream/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/baseos/debug',\n 'content/dist/rhel8/8/ppc64le/baseos/os',\n 'content/dist/rhel8/8/ppc64le/baseos/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/debug',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/os',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/highavailability/debug',\n 'content/dist/rhel8/8/ppc64le/highavailability/os',\n 'content/dist/rhel8/8/ppc64le/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/debug',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/os',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/debug',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/os',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap/debug',\n 'content/dist/rhel8/8/ppc64le/sap/os',\n 'content/dist/rhel8/8/ppc64le/sap/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/supplementary/debug',\n 'content/dist/rhel8/8/ppc64le/supplementary/os',\n 'content/dist/rhel8/8/ppc64le/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/s390x/appstream/debug',\n 'content/dist/rhel8/8/s390x/appstream/os',\n 'content/dist/rhel8/8/s390x/appstream/source/SRPMS',\n 'content/dist/rhel8/8/s390x/baseos/debug',\n 'content/dist/rhel8/8/s390x/baseos/os',\n 'content/dist/rhel8/8/s390x/baseos/source/SRPMS',\n 'content/dist/rhel8/8/s390x/codeready-builder/debug',\n 'content/dist/rhel8/8/s390x/codeready-builder/os',\n 'content/dist/rhel8/8/s390x/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/s390x/highavailability/debug',\n 'content/dist/rhel8/8/s390x/highavailability/os',\n 'content/dist/rhel8/8/s390x/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/s390x/resilientstorage/debug',\n 'content/dist/rhel8/8/s390x/resilientstorage/os',\n 'content/dist/rhel8/8/s390x/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/s390x/sap/debug',\n 'content/dist/rhel8/8/s390x/sap/os',\n 'content/dist/rhel8/8/s390x/sap/source/SRPMS',\n 'content/dist/rhel8/8/s390x/supplementary/debug',\n 'content/dist/rhel8/8/s390x/supplementary/os',\n 'content/dist/rhel8/8/s390x/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'exiv2-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-14T19:02:50", "description": "The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4276-1 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp. (CVE-2018-11531)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20098)\n\n - There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20099)\n\n - An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n (CVE-2019-13109)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-30T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : exiv2 (SUSE-SU-2022:4276-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-11591", "CVE-2018-11531", "CVE-2018-17581", "CVE-2018-20097", "CVE-2018-20098", "CVE-2018-20099", "CVE-2019-13109", "CVE-2019-13110", "CVE-2019-17402", "CVE-2021-29473", "CVE-2021-32815"], "modified": "2023-07-14T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libexiv2-26", "p-cpe:/a:novell:suse_linux:libexiv2-devel", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2022-4276-1.NASL", "href": "https://www.tenable.com/plugins/nessus/168309", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:4276-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(168309);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/07/14\");\n\n script_cve_id(\n \"CVE-2017-11591\",\n \"CVE-2018-11531\",\n \"CVE-2018-17581\",\n \"CVE-2018-20097\",\n \"CVE-2018-20098\",\n \"CVE-2018-20099\",\n \"CVE-2019-13109\",\n \"CVE-2019-13110\",\n \"CVE-2019-17402\",\n \"CVE-2021-29473\",\n \"CVE-2021-32815\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:4276-1\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : exiv2 (SUSE-SU-2022:4276-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by\nmultiple vulnerabilities as referenced in the SUSE-SU-2022:4276-1 advisory.\n\n - There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a\n remote denial of service attack via crafted input. (CVE-2017-11591)\n\n - Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp. (CVE-2018-11531)\n\n - CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a\n recursive function, leading to Denial of service. (CVE-2018-17581)\n\n - There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20097)\n\n - There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2\n 0.27-RC3. A crafted input will lead to a remote denial of service attack. (CVE-2018-20098)\n\n - There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted\n input will lead to a remote denial of service attack. (CVE-2018-20099)\n\n - An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via\n a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n (CVE-2019-13109)\n\n - A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an\n attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. (CVE-2019-13110)\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted\n image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they\n can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when\n modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and\n bug fix: #1739 ### For more information Please see our [security\n policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.\n (CVE-2021-32815)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1050257\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1095070\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1110282\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119559\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119560\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1119562\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1142677\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1142678\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1153577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1186231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-11591\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-11531\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-17581\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20097\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20098\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20099\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13109\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-13110\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-17402\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-32815\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f51feb96\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected libexiv2-26 and / or libexiv2-devel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-11531\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libexiv2-26\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libexiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(os_release) || os_release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)(?:_SAP)?\\d+)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);\n\nvar service_pack = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(service_pack)) service_pack = \"0\";\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(3)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLED15 SP3\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLED_SAP15\" && (! preg(pattern:\"^(3)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLED_SAP15 SP3\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(3)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES15 SP3\", os_ver + \" SP\" + service_pack);\nif (os_ver == \"SLES_SAP15\" && (! preg(pattern:\"^(2|3)$\", string:service_pack))) audit(AUDIT_OS_NOT, \"SLES_SAP15 SP2/3\", os_ver + \" SP\" + service_pack);\n\nvar pkgs = [\n {'reference':'libexiv2-26-0.26-150000.6.26.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},\n {'reference':'libexiv2-devel-0.26-150000.6.26.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},\n {'reference':'libexiv2-26-0.26-150000.6.26.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},\n {'reference':'libexiv2-26-0.26-150000.6.26.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},\n {'reference':'libexiv2-devel-0.26-150000.6.26.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},\n {'reference':'libexiv2-devel-0.26-150000.6.26.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},\n {'reference':'libexiv2-26-0.26-150000.6.26.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-desktop-applications-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},\n {'reference':'libexiv2-26-0.26-150000.6.26.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-desktop-applications-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},\n {'reference':'libexiv2-devel-0.26-150000.6.26.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-desktop-applications-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},\n {'reference':'libexiv2-devel-0.26-150000.6.26.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-desktop-applications-release-15.3', 'sled-release-15.3', 'sles-release-15.3']}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && _release) {\n if (exists_check) {\n var check_flag = 0;\n foreach var check (exists_check) {\n if (!rpm_exists(release:_release, rpm:check)) continue;\n check_flag++;\n }\n if (!check_flag) continue;\n }\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libexiv2-26 / libexiv2-devel');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-11T15:32:31", "description": "The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2021:4173 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-02-09T00:00:00", "type": "nessus", "title": "AlmaLinux 8 : exiv2 (ALSA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-10T00:00:00", "cpe": ["p-cpe:/a:alma:linux:exiv2", "p-cpe:/a:alma:linux:exiv2-devel", "p-cpe:/a:alma:linux:exiv2-doc", "p-cpe:/a:alma:linux:exiv2-libs", "cpe:/o:alma:linux:8"], "id": "ALMA_LINUX_ALSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/157702", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# AlmaLinux Security Advisory ALSA-2021:4173.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157702);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/10\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"ALSA\", value:\"2021:4173\");\n\n script_name(english:\"AlmaLinux 8 : exiv2 (ALSA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote AlmaLinux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nALSA-2021:4173 advisory.\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when writing the metadata, which is a less\n frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29464)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a\n command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image\n files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.\n An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if\n they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered\n when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For\n example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line\n argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for\n information about Exiv2 security. (CVE-2021-29473)\n\n - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and\n ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2\n is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of\n image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a\n crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack\n memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in\n version v0.27.4. (CVE-2021-29623)\n\n - An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based\n buffer overflow and cause a denial of service (DOS) via crafted metadata. (CVE-2021-31292)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and\n earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image\n file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can\n trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note\n that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2\n operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line\n application, you need to add an extra command-line argument such as `rm`. (CVE-2021-32617)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into\n running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC\n profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p\n C`). The bug is fixed in version v0.27.5. (CVE-2021-37618)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.5. (CVE-2021-37619)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://errata.almalinux.org/8/ALSA-2021-4173.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:alma:linux:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:alma:linux:8\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Alma Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AlmaLinux/release\", \"Host/AlmaLinux/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/AlmaLinux/release');\nif (isnull(release) || 'AlmaLinux' >!< release) audit(AUDIT_OS_NOT, 'AlmaLinux');\nvar os_ver = pregmatch(pattern: \"AlmaLinux release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'AlmaLinux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'AlmaLinux 8.x', 'AlmaLinux ' + os_ver);\n\nif (!get_kb_item('Host/AlmaLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'AlmaLinux', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'Alma-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release && (!exists_check || rpm_exists(release:release, rpm:exists_check))) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-25T15:27:34", "description": "The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-11-11T00:00:00", "type": "nessus", "title": "CentOS 8 : exiv2 (CESA-2021:4173)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-24T00:00:00", "cpe": ["cpe:/o:centos:centos:8-stream", "p-cpe:/a:centos:centos:exiv2", "p-cpe:/a:centos:centos:exiv2-devel", "p-cpe:/a:centos:centos:exiv2-doc", "p-cpe:/a:centos:centos:exiv2-libs"], "id": "CENTOS8_RHSA-2021-4173.NASL", "href": "https://www.tenable.com/plugins/nessus/155035", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# Red Hat Security Advisory RHSA-2021:4173. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155035);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/24\");\n\n script_cve_id(\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n script_xref(name:\"RHSA\", value:\"2021:4173\");\n\n script_name(english:\"CentOS 8 : exiv2 (CESA-2021:4173)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CentOS host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nCESA-2021:4173 advisory.\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n - exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n - exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n - exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470, CVE-2021-37619)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n - exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n - exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS\n (CVE-2021-31292)\n\n - exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n - exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n - exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:4173\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8-stream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:exiv2-libs\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CentOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/CentOS/release');\nif (isnull(release) || 'CentOS' >!< release) audit(AUDIT_OS_NOT, 'CentOS');\nvar os_ver = pregmatch(pattern: \"CentOS(?: Stream)?(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'CentOS');\nvar os_ver = os_ver[1];\nif ('CentOS Stream' >!< release) audit(AUDIT_OS_NOT, 'CentOS 8-Stream');\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'CentOS 8.x', 'CentOS ' + os_ver);\n\nif (!get_kb_item('Host/CentOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'CentOS', cpu);\n\nvar pkgs = [\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-devel-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-doc-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'exiv2-libs-0.27.4-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'CentOS-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2 / exiv2-devel / exiv2-doc / exiv2-libs');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-09T21:01:58", "description": "The remote NewStart CGSL host, running version MAIN 6.02, has exiv2 packages installed that are affected by multiple vulnerabilities:\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-15T00:00:00", "type": "nessus", "title": "NewStart CGSL MAIN 6.02 : exiv2 Multiple Vulnerabilities (NS-SA-2022-0090)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17402", "CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2023-11-09T00:00:00", "cpe": ["p-cpe:/a:zte:cgsl_main:exiv2-libs", "cpe:/o:zte:cgsl_main:6"], "id": "NEWSTART_CGSL_NS-SA-2022-0090_EXIV2.NASL", "href": "https://www.tenable.com/plugins/nessus/167490", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2022-0090. The text\n# itself is copyright (C) ZTE, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(167490);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/09\");\n\n script_cve_id(\n \"CVE-2019-17402\",\n \"CVE-2021-3482\",\n \"CVE-2021-29457\",\n \"CVE-2021-29458\",\n \"CVE-2021-29463\",\n \"CVE-2021-29464\",\n \"CVE-2021-29470\",\n \"CVE-2021-29473\",\n \"CVE-2021-29623\",\n \"CVE-2021-31291\",\n \"CVE-2021-31292\",\n \"CVE-2021-32617\",\n \"CVE-2021-37618\",\n \"CVE-2021-37619\"\n );\n\n script_name(english:\"NewStart CGSL MAIN 6.02 : exiv2 Multiple Vulnerabilities (NS-SA-2022-0090)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote NewStart CGSL host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version MAIN 6.02, has exiv2 packages installed that are affected by multiple\nvulnerabilities:\n\n - Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from\n Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the\n relationship of the total size to the offset and size. (CVE-2019-17402)\n\n - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the\n rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow\n via a crafted JPG image containing malicious EXIF data. (CVE-2021-3482)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow\n is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially\n exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a\n crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less\n frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2\n command-line application, you need to add an extra command-line argument such as `insert`. The bug is\n fixed in version v0.27.4. (CVE-2021-29457)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as insert. The bug is fixed in version v0.27.4. (CVE-2021-29458, CVE-2021-29470)\n\n - Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata\n of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds\n read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could\n potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick\n the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing\n the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to\n trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such\n as `insert`. The bug is fixed in version v0.27.4. (CVE-2021-29463)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2022-0090\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2019-17402\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29457\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29458\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29463\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29464\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29470\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29473\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-29623\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-31291\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-31292\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-32617\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-3482\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37618\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/info/CVE-2021-37619\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL exiv2 packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-29464\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:zte:cgsl_main:exiv2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:zte:cgsl_main:6\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar os_release = get_kb_item('Host/ZTE-CGSL/release');\nif (isnull(os_release) || os_release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');\n\nif (os_release !~ \"CGSL MAIN 6.02\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 6.02');\n\nif (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);\n\nvar flag = 0;\n\nvar pkgs = {\n 'CGSL MAIN 6.02': [\n 'exiv2-libs-0.27.4-5.el8'\n ]\n};\nvar pkg_list = pkgs[os_release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:'ZTE ' + os_release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'exiv2');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "osv": [{"lastseen": "2022-07-21T08:15:07", "description": "\nSeveral vulnerabilities have been discovered in Exiv2, a C++ library\nand a command line utility to manage image metadata which could result\nin denial of service or the execution of arbitrary code if a malformed\nfile is parsed.\n\n\nFor Debian 9 stretch, these problems have been fixed in version\n0.25-3.1+deb9u3.\n\n\nWe recommend that you upgrade your exiv2 packages.\n\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\n<https://security-tracker.debian.org/tracker/exiv2>\n\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: <https://wiki.debian.org/LTS>\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-30T00:00:00", "type": "osv", "title": "exiv2 - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473", "CVE-2021-31292", "CVE-2021-3482", "CVE-2019-20421", "CVE-2021-29457"], "modified": "2022-07-21T05:53:51", "id": "OSV:DLA-2750-1", "href": "https://osv.dev/vulnerability/DLA-2750-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-08-10T07:15:40", "description": "\nSeveral vulnerabilities have been discovered in Exiv2, a C++ library and\na command line utility to manage image metadata which could result in\ndenial of service or the execution of arbitrary code if a malformed\nfile is parsed.\n\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 0.25-4+deb10u2.\n\n\nWe recommend that you upgrade your exiv2 packages.\n\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\n[\\\nhttps://security-tracker.debian.org/tracker/exiv2](https://security-tracker.debian.org/tracker/exiv2)\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-13T00:00:00", "type": "osv", "title": "exiv2 - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29473", "CVE-2021-31292", "CVE-2021-3482", "CVE-2019-20421", "CVE-2021-29457"], "modified": "2022-08-10T07:15:36", "id": "OSV:DSA-4958-1", "href": "https://osv.dev/vulnerability/DSA-4958-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2023-12-03T18:55:08", "description": "## Releases\n\n * Ubuntu 21.04 \n * Ubuntu 20.10 \n * Ubuntu 20.04 LTS\n * Ubuntu 18.04 ESM\n * Ubuntu 16.04 ESM\n\n## Packages\n\n * exiv2 \\- EXIF/IPTC/XMP metadata manipulation tool\n\nIt was discovered that Exiv2 incorrectly handled certain files. \nAn attacker could possibly use this issue to cause a denial of service. \nThis issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04. \n(CVE-2021-29463)\n\nIt was discovered that Exiv2 incorrectly handled certain files. \nAn attacker could possibly use this issue to execute arbitrary code. \nThis issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04. \n(CVE-2021-29464)\n\nIt was discovered that Exiv2 incorrectly handled certain files. \nAn attacker could possibly use this issue to cause a denial of service. \n(CVE-2021-29473, CVE-2021-32617)\n\nIt was discovered that Exiv2 incorrectly handled certain files. \nAn attacker could possibly use this issue to expose sensitive information. \nThis issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04. \n(CVE-2021-29623)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-25T00:00:00", "type": "ubuntu", "title": "Exiv2 vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617"], "modified": "2021-05-25T00:00:00", "id": "USN-4964-1", "href": "https://ubuntu.com/security/notices/USN-4964-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2023-12-03T10:22:03", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4958-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nAugust 13, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : exiv2\nCVE ID : CVE-2019-20421 CVE-2021-3482 CVE-2021-29457\n CVE-2021-29473 CVE-2021-31292\n\nSeveral vulnerabilities have been discovered in Exiv2, a C++ library and\na command line utility to manage image metadata which could result in\ndenial of service or the execution of arbitrary code if a malformed\nfile is parsed.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 0.25-4+deb10u2.\n\nWe recommend that you upgrade your exiv2 packages.\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/exiv2\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-08-13T20:53:51", "type": "debian", "title": "[SECURITY] [DSA 4958-1] exiv2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-20421", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31292", "CVE-2021-3482"], "modified": "2021-08-13T20:53:51", "id": "DEBIAN:DSA-4958-1:700B1", "href": "https://lists.debian.org/debian-security-announce/2021/msg00142.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-10-22T11:14:55", "description": "- -----------------------------------------------------------------------\nDebian LTS Advisory DLA-2750-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Utkarsh Gupta\nAugust 30, 2021 https://wiki.debian.org/LTS\n- -----------------------------------------------------------------------\n\nPackage : exiv2\nVersion : 0.25-3.1+deb9u3\nCVE ID : CVE-2019-20421 CVE-2021-3482 CVE-2021-29457\n CVE-2021-29473 CVE-2021-31291 CVE-2021-31292\nDebian Bug : 950183 986888 987277 991705 991705 991706\n\nSeveral vulnerabilities have been discovered in Exiv2, a C++ library\nand a command line utility to manage image metadata which could result\nin denial of service or the execution of arbitrary code if a malformed\nfile is parsed.\n\nFor Debian 9 stretch, these problems have been fixed in version\n0.25-3.1+deb9u3.\n\nWe recommend that you upgrade your exiv2 packages.\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/exiv2\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-30T03:03:59", "type": "debian", "title": "[SECURITY] [DLA 2750-1] exiv2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-20421", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-3482"], "modified": "2021-08-30T03:03:59", "id": "DEBIAN:DLA-2750-1:0036D", "href": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-12-03T16:54:13", "description": "- -----------------------------------------------------------------------\nDebian LTS Advisory DLA-2750-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Utkarsh Gupta\nAugust 30, 2021 https://wiki.debian.org/LTS\n- -----------------------------------------------------------------------\n\nPackage : exiv2\nVersion : 0.25-3.1+deb9u3\nCVE ID : CVE-2019-20421 CVE-2021-3482 CVE-2021-29457\n CVE-2021-29473 CVE-2021-31291 CVE-2021-31292\nDebian Bug : 950183 986888 987277 991705 991705 991706\n\nSeveral vulnerabilities have been discovered in Exiv2, a C++ library\nand a command line utility to manage image metadata which could result\nin denial of service or the execution of arbitrary code if a malformed\nfile is parsed.\n\nFor Debian 9 stretch, these problems have been fixed in version\n0.25-3.1+deb9u3.\n\nWe recommend that you upgrade your exiv2 packages.\n\nFor the detailed security status of exiv2 please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/exiv2\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-08-30T03:03:59", "type": "debian", "title": "[SECURITY] [DLA 2750-1] exiv2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-20421", "CVE-2021-29457", "CVE-2021-29473", "CVE-2021-31291", "CVE-2021-31292", "CVE-2021-3482"], "modified": "2021-08-30T03:03:59", "id": "DEBIAN:DLA-2750-1:F28B2", "href": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "mageia": [{"lastseen": "2023-12-03T17:33:22", "description": "The updated packages fix security vulnerabilities: Heap-based buffer overflow in Jp2Image::readMetadata(). (CVE-2021-3482) Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata. (CVE-2021-29457) Out-of-bounds read in Exiv2::Internal::CrwMap::encode. (CVE-2021-29458) Exiv2 incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. (CVE-2021-29463) Exiv2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-29464) Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header. (CVE-2021-29470) Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata. (CVE-2021-29473) Read of uninitialized memory may lead to information leak. (CVE-2021-29623) DoS due to quadratic complexity in ProcessUTF8Portion. (CVE-2021-32617) \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-06-08T19:46:03", "type": "mageia", "title": "Updated exiv2 packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-06-08T19:46:03", "id": "MGASA-2021-0240", "href": "https://advisories.mageia.org/MGASA-2021-0240.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2023-12-03T15:42:36", "description": "Arch Linux Security Advisory ASA-202106-54\n==========================================\n\nSeverity: Low\nDate : 2021-06-22\nCVE-ID : CVE-2021-3482 CVE-2021-29457 CVE-2021-29458 CVE-2021-29463\nCVE-2021-29464 CVE-2021-29470 CVE-2021-29473 CVE-2021-29623\nCVE-2021-32617\nPackage : exiv2\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1772\n\nSummary\n=======\n\nThe package exiv2 before version 0.27.4-1 is vulnerable to multiple\nissues including arbitrary code execution, denial of service and\ninformation disclosure.\n\nResolution\n==========\n\nUpgrade to 0.27.4-1.\n\n# pacman -Syu \"exiv2>=0.27.4-1\"\n\nThe problems have been fixed upstream in version 0.27.4.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2021-3482 (arbitrary code execution)\n\nA security issue was found in Exiv2 in versions before version 0.27.4.\nImproper input validation of the rawData.size property in\nJp2Image::readMetadata() in jp2image.cpp can lead to a heap-based\nbuffer overflow via a crafted JPG image containing malicious EXIF data.\nAn attacker could potentially exploit the vulnerability to gain code\nexecution, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\n- CVE-2021-29457 (arbitrary code execution)\n\nA heap buffer overflow was found in Exiv2 before version 0.27.4. The\nheap overflow is triggered when Exiv2 is used to write metadata into a\ncrafted image file. An attacker could potentially exploit the\nvulnerability to gain code execution, if they can trick the victim into\nrunning Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when _writing_ the metadata, which\nis a less frequently used Exiv2 operation than _reading_ the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29458 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29463 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29464 (arbitrary code execution)\n\nA heap buffer overflow was found in Exiv2 before version 0.27.4. The\nheap overflow is triggered when Exiv2 is used to write metadata into a\ncrafted image file. An attacker could potentially exploit the\nvulnerability to gain code execution, if they can trick the victim into\nrunning Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29470 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. The\nout-of-bounds read is triggered when Exiv2 is used to write metadata\ninto a crafted image file. An attacker could potentially exploit the\nvulnerability to cause a denial of service by crashing Exiv2, if they\ncan trick the victim into running Exiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29473 (denial of service)\n\nAn out-of-bounds read was found in Exiv2 before version 0.27.4. An\nattacker could potentially exploit the vulnerability to cause a denial\nof service by crashing Exiv2, if they can trick the victim into running\nExiv2 on a crafted image file.\n\nNote that this bug is only triggered when writing the metadata, which\nis a less frequently used Exiv2 operation than reading the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as insert.\n\n- CVE-2021-29623 (information disclosure)\n\nA read of uninitialized memory was found in Exiv2 before version\n0.27.4. The read of uninitialized memory is triggered when Exiv2 is\nused to read the metadata of a crafted image file. An attacker could\npotentially exploit the vulnerability to leak a few bytes of stack\nmemory, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\n- CVE-2021-32617 (denial of service)\n\nAn inefficient algorithm (quadratic complexity) was found in Exiv2\nbefore version 0.27.4. The inefficient algorithm is triggered when\nExiv2 is used to write metadata into a crafted image file. An attacker\ncould potentially exploit the vulnerability to cause a denial of\nservice, if they can trick the victim into running Exiv2 on a crafted\nimage file.\n\nNote that this bug is only triggered when _writing_ the metadata, which\nis a less frequently used Exiv2 operation than _reading_ the metadata.\nFor example, to trigger the bug in the Exiv2 command-line application,\nyou need to add an extra command-line argument such as rm.\n\nImpact\n======\n\nReading or writing EXIF metadata of a crafted image file could lead to\narbitrary code execution.\n\nReferences\n==========\n\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9\nhttps://github.com/Exiv2/exiv2/issues/1522\nhttps://github.com/Exiv2/exiv2/pull/1523\nhttps://github.com/Exiv2/exiv2/commit/22ea582c6b74ada30bec3a6b15de3c3e52f2b4da\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm\nhttps://github.com/Exiv2/exiv2/issues/1529\nhttps://github.com/Exiv2/exiv2/pull/1534\nhttps://github.com/Exiv2/exiv2/commit/13e5a3e02339b746abcaee6408893ca2fd8e289d\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5\nhttps://github.com/Exiv2/exiv2/issues/1530\nhttps://github.com/Exiv2/exiv2/pull/1536\nhttps://github.com/Exiv2/exiv2/pull/1539\nhttps://github.com/Exiv2/exiv2/commit/9b7a19f957af53304655ed1efe32253a1b11a8d0\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr\nhttps://github.com/Exiv2/exiv2/pull/1577\nhttps://github.com/Exiv2/exiv2/commit/d639e45c2cdc18b9b49b1307c6e4315277fa8cc4\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p\nhttps://github.com/Exiv2/exiv2/pull/1576\nhttps://github.com/Exiv2/exiv2/commit/0357f341e43f6e14123f227946574231ba379637\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj\nhttps://github.com/Exiv2/exiv2/pull/1581\nhttps://github.com/Exiv2/exiv2/commit/f6ee71526eef5649a529ac6da3f2843e3b63e227\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2\nhttps://github.com/Exiv2/exiv2/pull/1587\nhttps://github.com/Exiv2/exiv2/commit/e6a0982f7cd9282052b6e3485a458d60629ffa0b\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v\nhttps://github.com/Exiv2/exiv2/pull/1627\nhttps://github.com/Exiv2/exiv2/commit/0f9eb74c44c908e170a64cab590949d53749af8e\nhttps://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj\nhttps://github.com/Exiv2/exiv2/pull/1657\nhttps://github.com/Exiv2/exiv2/commit/c261fbaa2567687eec6a595d3016212fd6ae648d\nhttps://security.archlinux.org/CVE-2021-3482\nhttps://security.archlinux.org/CVE-2021-29457\nhttps://security.archlinux.org/CVE-2021-29458\nhttps://security.archlinux.org/CVE-2021-29463\nhttps://security.archlinux.org/CVE-2021-29464\nhttps://security.archlinux.org/CVE-2021-29470\nhttps://security.archlinux.org/CVE-2021-29473\nhttps://security.archlinux.org/CVE-2021-29623\nhttps://security.archlinux.org/CVE-2021-32617", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-06-22T00:00:00", "type": "archlinux", "title": "[ASA-202106-54] exiv2: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-06-22T00:00:00", "id": "ASA-202106-54", "href": "https://security.archlinux.org/ASA-202106-54", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2023-12-03T16:50:38", "description": "\n\nExiv2 teams reports:\n\nMultiple vulnerabilities covering buffer overflows, out-of-bounds,\n\t read of uninitialized memory and denial of serivce. The heap\n\t overflow is triggered when Exiv2 is used to read the metadata of\n\t a crafted image file. An attacker could potentially exploit the\n\t vulnerability to gain code execution, if they can trick the victim\n\t into running Exiv2 on a crafted image file. The out-of-bounds read\n\t is triggered when Exiv2 is used to write metadata into a crafted\n\t image file. An attacker could potentially exploit the vulnerability\n\t to cause a denial of service by crashing Exiv2, if they can trick\n\t the victim into running Exiv2 on a crafted image file. The read of\n\t uninitialized memory is triggered when Exiv2 is used to read the\n\t metadata of a crafted image file. An attacker could potentially\n\t exploit the vulnerability to leak a few bytes of stack memory, if\n\t they can trick the victim into running Exiv2 on a crafted image\n\t file.\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-04-25T00:00:00", "type": "freebsd", "title": "Exiv2 -- Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-32617", "CVE-2021-3482"], "modified": "2021-04-25T00:00:00", "id": "D49F86AB-D9C7-11EB-A200-00155D01F201", "href": "https://vuxml.freebsd.org/freebsd/d49f86ab-d9c7-11eb-a200-00155d01f201.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "rocky": [{"lastseen": "2023-12-03T17:28:08", "description": "An update is available for exiv2.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list\nExiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "rocky", "title": "exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-09T08:31:22", "id": "RLSA-2021:4173", "href": "https://errata.rockylinux.org/RLSA-2021:4173", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "almalinux": [{"lastseen": "2023-12-03T17:28:39", "description": "Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "almalinux", "title": "Moderate: exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-12T10:21:01", "id": "ALSA-2021:4173", "href": "https://errata.almalinux.org/8/ALSA-2021-4173.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2023-12-03T18:41:23", "description": "Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.\n\nThe following packages have been upgraded to a later upstream version: exiv2 (0.27.4). (BZ#1989860)\n\nSecurity Fix(es):\n\n* exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() (CVE-2021-3482)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29457)\n\n* exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode (CVE-2021-29458)\n\n* exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29464)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-29470)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata (CVE-2021-29473)\n\n* exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS (CVE-2021-31292)\n\n* exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata (CVE-2021-29463)\n\n* exiv2: Use of uninitialized memory in isWebPType() may lead to information leak (CVE-2021-29623)\n\n* exiv2: DoS due to quadratic complexity in ProcessUTF8Portion (CVE-2021-32617)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure (CVE-2021-37618)\n\n* exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header (CVE-2021-37619)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-11-09T08:31:22", "type": "redhat", "title": "(RHSA-2021:4173) Moderate: exiv2 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-29457", "CVE-2021-29458", "CVE-2021-29463", "CVE-2021-29464", "CVE-2021-29470", "CVE-2021-29473", "CVE-2021-29623", "CVE-2021-31292", "CVE-2021-32617", "CVE-2021-3482", "CVE-2021-37618", "CVE-2021-37619"], "modified": "2021-11-09T14:11:05", "id": "RHSA-2021:4173", "href": "https://access.redhat.com/errata/RHSA-2021:4173", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}