SUSE SLED15 / SLES15 Security Update : openjpeg2 (SUSE-SU-2022:1252-1)

high Nessus Plugin ID 159981

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:1252-1 advisory.

- Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). (CVE-2018-14423)

- An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow. (CVE-2018-16375)

- An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact. (CVE-2018-16376)

- Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). (CVE-2018-20845)

- In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. (CVE-2018-5727)

- In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. (CVE-2018-5785)

- In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c.
Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
(CVE-2018-6616)

- jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice. (CVE-2020-15389)

- A flaw was found in OpenJPEG's encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-27823)

- OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation. (CVE-2020-6851)

- opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851. (CVE-2020-8112)

- Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option -ImgDir on a directory that contains 1048576 files. (CVE-2021-29338)

- A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service. (CVE-2022-1122)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libopenjp2-7, openjpeg2 and / or openjpeg2-devel packages.

See Also

https://bugzilla.suse.com/1076314

https://bugzilla.suse.com/1076967

https://bugzilla.suse.com/1079845

https://bugzilla.suse.com/1102016

https://bugzilla.suse.com/1106881

https://bugzilla.suse.com/1106882

https://bugzilla.suse.com/1140130

https://bugzilla.suse.com/1160782

https://bugzilla.suse.com/1162090

https://bugzilla.suse.com/1173578

https://bugzilla.suse.com/1180457

https://bugzilla.suse.com/1184774

https://bugzilla.suse.com/1197738

http://www.nessus.org/u?0e1d3b41

https://www.suse.com/security/cve/CVE-2018-14423

https://www.suse.com/security/cve/CVE-2018-16375

https://www.suse.com/security/cve/CVE-2018-16376

https://www.suse.com/security/cve/CVE-2018-20845

https://www.suse.com/security/cve/CVE-2018-5727

https://www.suse.com/security/cve/CVE-2018-5785

https://www.suse.com/security/cve/CVE-2018-6616

https://www.suse.com/security/cve/CVE-2020-15389

https://www.suse.com/security/cve/CVE-2020-27823

https://www.suse.com/security/cve/CVE-2020-6851

https://www.suse.com/security/cve/CVE-2020-8112

https://www.suse.com/security/cve/CVE-2021-29338

https://www.suse.com/security/cve/CVE-2022-1122

Plugin Details

Severity: High

ID: 159981

File Name: suse_SU-2022-1252-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 4/20/2022

Updated: 4/20/2022

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2020-8112

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libopenjp2-7, p-cpe:/a:novell:suse_linux:openjpeg2, p-cpe:/a:novell:suse_linux:openjpeg2-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/19/2022

Vulnerability Publication Date: 1/16/2018

Reference Information

CVE: CVE-2018-5727, CVE-2018-5785, CVE-2018-6616, CVE-2018-14423, CVE-2018-16375, CVE-2018-16376, CVE-2018-20845, CVE-2020-6851, CVE-2020-8112, CVE-2020-15389, CVE-2020-27823, CVE-2021-29338, CVE-2022-1122

SuSE: SUSE-SU-2022:1252-1