Various minor vulnerabilities have been addredd in libexif, a library to parse EXIF metadata files.
CVE-2018-20030
This issue had already been addressed via DLA-2214-1. However, upstream provided an updated patch, so this has been followed up on.
CVE-2020-13112
Several buffer over-reads in EXIF MakerNote handling could have lead to information disclosure and crashes. This issue is different from already resolved CVE-2020-0093.
CVE-2020-13113
Use of uninitialized memory in EXIF Makernote handling could have lead to crashes and potential use-after-free conditions.
CVE-2020-13114
An unrestricted size in handling Canon EXIF MakerNote data could have lead to consumption of large amounts of compute time for decoding EXIF data.
For Debian 8 βJessieβ, these problems have been fixed in version 0.6.21-2+deb8u3.
We recommend that you upgrade your libexif packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-2222-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(136952);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/08");
script_cve_id(
"CVE-2018-20030",
"CVE-2020-13112",
"CVE-2020-13113",
"CVE-2020-13114"
);
script_name(english:"Debian DLA-2222-1 : libexif security update");
script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing a security update.");
script_set_attribute(attribute:"description", value:
"Various minor vulnerabilities have been addredd in libexif, a library
to parse EXIF metadata files.
CVE-2018-20030
This issue had already been addressed via DLA-2214-1. However,
upstream provided an updated patch, so this has been followed up on.
CVE-2020-13112
Several buffer over-reads in EXIF MakerNote handling could have lead
to information disclosure and crashes. This issue is different from
already resolved CVE-2020-0093.
CVE-2020-13113
Use of uninitialized memory in EXIF Makernote handling could have lead
to crashes and potential use-after-free conditions.
CVE-2020-13114
An unrestricted size in handling Canon EXIF MakerNote data could have
lead to consumption of large amounts of compute time for decoding EXIF
data.
For Debian 8 'Jessie', these problems have been fixed in version
0.6.21-2+deb8u3.
We recommend that you upgrade your libexif packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html");
script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/jessie/libexif");
script_set_attribute(attribute:"solution", value:
"Upgrade the affected libexif-dev, and libexif12 packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-13113");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-13112");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/20");
script_set_attribute(attribute:"patch_publication_date", value:"2020/05/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libexif-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libexif12");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Debian Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"8.0", prefix:"libexif-dev", reference:"0.6.21-2+deb8u3")) flag++;
if (deb_check(release:"8.0", prefix:"libexif12", reference:"0.6.21-2+deb8u3")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | libexif-dev | p-cpe:/a:debian:debian_linux:libexif-dev |
debian | debian_linux | libexif12 | p-cpe:/a:debian:debian_linux:libexif12 |
debian | debian_linux | 8.0 | cpe:/o:debian:debian_linux:8.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114
lists.debian.org/debian-lts-announce/2020/05/msg00025.html
packages.debian.org/source/jessie/libexif