OpenSUSE Linux update for opencv



| Updated: 2018-05-31
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2017-1000450
CVE-2017-17760
CVE-2017-18009
CVE-2018-5268
CVE-2018-5269
CWE-ID CWE-190
CWE-120
CWE-126
CWE-122
CWE-617
Exploitation vector Network
Public exploit N/A
Vulnerable software
openSUSE Leap
Operating systems & Components / Operating system package or component

Vendor SDB

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU13113

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-1000450

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to integer overflow in opencv/modules/imgcodecs/src/utils.cpp when functions FillUniColor and FillUniGray do not check the input length. A remote attacker can supply specially crafted image, trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages.

Vulnerable software versions

openSUSE Leap: 42.3

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00106.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU13114

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-17760

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to buffer overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp when an incorrect size value is used. A remote attacker can supply specially crafted image, trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages.

Vulnerable software versions

openSUSE Leap: 42.3

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00106.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Heap-based buffer over-read

EUVDB-ID: #VU13115

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-18009

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to heap-based buffer over-read in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp. A remote attacker can supply specially crafted image, trigger memory corruption and cause the service to crash.

Mitigation

Update the affected packages.

Vulnerable software versions

openSUSE Leap: 42.3

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00106.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Heap-based buffer overflow

EUVDB-ID: #VU13116

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5268

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to heap-based buffer overflow in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing malicious input. A remote attacker can supply specially crafted image, trigger memory corruption and cause the service to crash.

Mitigation

Update the affected packages.

Vulnerable software versions

openSUSE Leap: 42.3

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00106.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Assertion failure

EUVDB-ID: #VU13117

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-5269

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to assertion failure in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp when incorrect integer cast. A remote attacker can supply specially crafted image and cause the service to crash.

Mitigation

Update the affected packages.

Vulnerable software versions

openSUSE Leap: 42.3

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00106.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###