Debian DLA-3518-1 : openimageio - LTS security update

critical Nessus Plugin ID 179425

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3518 advisory.

- A heap out of bounds read vulnerability exists in the handling of IPTC data while parsing TIFF images in OpenImageIO v2.3.19.0. A specially-crafted TIFF file can cause a read of adjacent heap memory, which can leak sensitive process information. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2022-41649)

- A heap out of bounds read vulnerability exists in the OpenImageIO master-branch-9aeece7a when parsing the image file directory part of a PSD image file. A specially-crafted .psd file can cause a read of arbitrary memory address which can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2022-41684)

- A heap based buffer overflow vulnerability exists in the PSD thumbnail resource parsing code of OpenImageIO 2.3.19.0. A specially-crafted PSD file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2022-41794)

- An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2022-41837)

- A denial of service vulnerability exists in the FitsOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide malicious input to trigger this vulnerability. (CVE-2023-24472)

- Buffer Overflow vulnerability in OpenImageIO v.2.4.12.0 and before allows a remote to execute arbitrary code and obtain sensitive information via a crafted file to the readimg function. (CVE-2023-36183)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the openimageio packages.

For Debian 10 buster, these problems have been fixed in version 2.0.5~dfsg0-1+deb10u2.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027143

https://security-tracker.debian.org/tracker/source-package/openimageio

https://www.debian.org/lts/security/2023/dla-3518

https://security-tracker.debian.org/tracker/CVE-2022-41649

https://security-tracker.debian.org/tracker/CVE-2022-41684

https://security-tracker.debian.org/tracker/CVE-2022-41794

https://security-tracker.debian.org/tracker/CVE-2022-41837

https://security-tracker.debian.org/tracker/CVE-2023-24472

https://security-tracker.debian.org/tracker/CVE-2023-36183

https://packages.debian.org/source/buster/openimageio

Plugin Details

Severity: Critical

ID: 179425

File Name: debian_DLA-3518.nasl

Version: 1.0

Type: local

Agent: unix

Published: 8/8/2023

Updated: 8/8/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-41837

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libopenimageio-dev, p-cpe:/a:debian:debian_linux:libopenimageio-doc, p-cpe:/a:debian:debian_linux:libopenimageio2.0, p-cpe:/a:debian:debian_linux:openimageio-tools, p-cpe:/a:debian:debian_linux:python3-openimageio, cpe:/o:debian:debian_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/7/2023

Vulnerability Publication Date: 12/22/2022

Reference Information

CVE: CVE-2022-41649, CVE-2022-41684, CVE-2022-41794, CVE-2022-41837, CVE-2023-24472, CVE-2023-36183