Debian DSA-2629-1 : openjpeg - several issues

critical Nessus Plugin ID 64880

Synopsis

The remote Debian host is missing a security-related update.

Description

- CVE-2009-5030 Heap memory corruption leading to invalid free when processing certain Gray16 TIFF images.

- CVE-2012-3358 Huzaifa Sidhpurwala of the Red Hat Security Response Team found a heap-based buffer overflow in JPEG2000 image parsing.

- CVE-2012-3535 Huzaifa Sidhpurwala of the Red Hat Security Response Team found a heap-based buffer overflow when decoding JPEG2000 images.

Solution

Upgrade the openjpeg packages.

For the stable distribution (squeeze), these problems have been fixed in version 1.3+dfsg-4+squeeze1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672455

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681075

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685970

https://security-tracker.debian.org/tracker/CVE-2009-5030

https://security-tracker.debian.org/tracker/CVE-2012-3358

https://security-tracker.debian.org/tracker/CVE-2012-3535

https://packages.debian.org/source/squeeze/openjpeg

https://www.debian.org/security/2013/dsa-2629

Plugin Details

Severity: Critical

ID: 64880

File Name: debian_DSA-2629.nasl

Version: 1.11

Type: local

Agent: unix

Published: 2/26/2013

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openjpeg, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2/25/2013

Reference Information

CVE: CVE-2009-5030, CVE-2012-3358, CVE-2012-3535

BID: 53012, 54373, 55214

DSA: 2629