SB2020061149 - OpenSUSE Linux update for libexif 



SB2020061149 - OpenSUSE Linux update for libexif

Published: June 11, 2020

Security Bulletin ID SB2020061149
Severity
High
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 22% Medium 44% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2016-6328)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when parsing the MNOTE entry data of the input file. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Out-of-bounds read (CVE-ID: CVE-2017-7544)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper length computation of the allocated data of an ExifMnote entry within the exif_data_save_data_entry() function in libexif/exif-data.c. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


3) Uncontrolled Recursion (CVE-ID: CVE-2018-20030)

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to recursion issue when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif. A remote attacker can pass specially crafted data to the application and exhaust all available CPU resources.


4) Integer overflow (CVE-ID: CVE-2019-9278)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Out-of-bounds read (CVE-ID: CVE-2020-0093)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a missing bounds check in "exif_data_save_data_entry" of "exif-data.c" file within the Media framework functionality. A local user can trigger out-of-bounds read error and read contents of memory on the system.


6) Division by zero (CVE-ID: CVE-2020-12767)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to division by zero error in "exif_entry_get_value" in the "exif-entry.c" file. A local user can cause a denial of service condition on the target system.


7) Out-of-bounds read (CVE-ID: CVE-2020-13112)

The vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in EXIF MakerNote handling. A remote attacker can trigger out-of-bounds read error and read contents of memory on the system or cause a denial of service condition.


8) NULL pointer dereference (CVE-ID: CVE-2020-13113)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in EXIF Makernote handling. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.


9) Buffer overflow (CVE-ID: CVE-2020-13114)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when handling Canon EXIF MakerNote data. A remote attacker can send a specially crafted file, trigger memory corruption and cause a denial of service condition on the target system.


Remediation

Install update from vendor's website.