Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2017-11591 CVE-2018-11531 CVE-2018-17581 CVE-2018-20097 CVE-2018-20098 CVE-2018-20099 CVE-2019-13109 CVE-2019-13110 CVE-2019-17402 CVE-2021-29473 CVE-2021-32815 |
CWE-ID | CWE-248 CWE-122 CWE-400 CWE-119 CWE-125 CWE-835 CWE-190 CWE-617 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #8 is available. |
Vulnerable software |
SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Module for Desktop Applications Operating systems & Components / Operating system SUSE Linux Enterprise Desktop Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system libexiv2-26-32bit-debuginfo Operating systems & Components / Operating system package or component libexiv2-26-32bit Operating systems & Components / Operating system package or component libexiv2-26-debuginfo Operating systems & Components / Operating system package or component libexiv2-26 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU69760
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11591
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a floating point exception in the Exiv2::ValueType function in Exiv2. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13576
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11531
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to heap-based buffer overflow in getData in preview.cpp. A remote attacker can trigger memory corruption and perform a denial of service attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69761
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17581
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources caused by excessive stack consumption due to a recursive function within the CiffDirectory::readDirectory() function in crwimage_int.cpp. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36299
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20097
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36300
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20098
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36301
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-20099
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU19510
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-13109
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in Exiv2 through 0.27.1 due to PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. A remote attacker can create a crafted PNG image file, trigger integer overflow and perform denial of service (DoS) attack.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20305
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2019-13110
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to integer overflow in CiffDirectory::readDirectory() function. A remote attacker can create a specially crafted CRW image, pass it to the application, trigger integer overflow and crash the affected application.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU28797
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-17402
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary in Exiv2::getULong() function in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp. A remote attacker can pass specially crafted data to the application, trigger memory corruption and crash the service.
Update the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55921
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-29473
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when processing Exif, IPTC, XMP and ICC image metadata. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
MitigationUpdate the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69648
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32815
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion when handling metadata of image files. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2-0_26 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP4
SUSE Linux Enterprise Desktop: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
libexiv2-26-32bit-debuginfo: before 0.26-150400.9.21.1
libexiv2-26-32bit: before 0.26-150400.9.21.1
libexiv2-26-debuginfo: before 0.26-150400.9.21.1
libexiv2-26: before 0.26-150400.9.21.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20224208-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.