Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2428
HistoryJun 03, 2024 - 8:20 a.m.

Advisory ROSA-SA-2024-2428

2024-06-0308:20:14
ROSA LAB
abf.rosalinux.ru
security
advisory
djvulibre
vulnerabilities
fixed
update
unix
cve-2021-3500
cve-2021-46312
cve-2021-46310
rosa-sa-2024-2428
wasp-rosa-chrome
stack overflow
remote attack
denial of service

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%

software: djvulibre 3.5.28
WASP: ROSA-CHROME

package_evr_string: djvulibre-3.5.28-4

CVE-ID: CVE-2021-3500
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A flaw was discovered in djvulibre. A stack overflow in DJVU::DjVuDocument::get_djvu_file() via a created djvu file may cause the application to crash and other consequences.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update djvulibre

CVE-ID: CVE-2021-46312
BDU-ID: 2023-05878
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the IW44EncodeCodec.cpp component of the library for viewing, creating, editing DjVu files DjVuLibre is related to the lack of division by zero check. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update djvulibre

CVE-ID: CVE-2021-46310
BDU-ID: 2023-05879
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the IW44Image.cpp component of the library for viewing, creating, editing DjVu files DjVuLibre is related to the lack of division by zero check. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update djvulibre

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchdjvulibre< 3.5.28UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%