Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2017-11591 CVE-2018-11531 CVE-2018-17581 CVE-2018-20097 CVE-2018-20098 CVE-2018-20099 CVE-2019-13109 CVE-2019-13110 CVE-2019-17402 CVE-2021-29473 CVE-2021-32815 |
CWE-ID | CWE-248 CWE-122 CWE-400 CWE-119 CWE-125 CWE-835 CWE-190 CWE-617 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #8 is available. |
Vulnerable software |
SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Desktop Operating systems & Components / Operating system SUSE CaaS Platform Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise Module for Desktop Applications Operating systems & Components / Operating system libexiv2-26-32bit-debuginfo Operating systems & Components / Operating system package or component libexiv2-26-32bit Operating systems & Components / Operating system package or component exiv2-lang Operating systems & Components / Operating system package or component libexiv2-doc Operating systems & Components / Operating system package or component libexiv2-devel Operating systems & Components / Operating system package or component libexiv2-26-debuginfo Operating systems & Components / Operating system package or component libexiv2-26 Operating systems & Components / Operating system package or component exiv2-debugsource Operating systems & Components / Operating system package or component exiv2-debuginfo Operating systems & Components / Operating system package or component exiv2 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU69760
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-11591
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a floating point exception in the Exiv2::ValueType function in Exiv2. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13576
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-11531
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to heap-based buffer overflow in getData in preview.cpp. A remote attacker can trigger memory corruption and perform a denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69761
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-17581
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources caused by excessive stack consumption due to a recursive function within the CiffDirectory::readDirectory() function in crwimage_int.cpp. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36299
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-20097
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36300
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-20098
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU36301
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-20099
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU19510
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-13109
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in Exiv2 through 0.27.1 due to PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. A remote attacker can create a crafted PNG image file, trigger integer overflow and perform denial of service (DoS) attack.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20305
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2019-13110
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to integer overflow in CiffDirectory::readDirectory() function. A remote attacker can create a specially crafted CRW image, pass it to the application, trigger integer overflow and crash the affected application.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU28797
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-17402
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary in Exiv2::getULong() function in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp. A remote attacker can pass specially crafted data to the application, trigger memory corruption and crash the service.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55921
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-29473
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when processing Exif, IPTC, XMP and ICC image metadata. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
MitigationUpdate the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69648
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-32815
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion when handling metadata of image files. A remote attacker can pass a specially crafted image to the application and perform a denial of service (DoS) attack.
Update the affected package exiv2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.2
SUSE Manager Server: 4.1 - 4.2
SUSE Manager Proxy: 4.1 - 4.2
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-LTSS - 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3
libexiv2-26-32bit-debuginfo: before 0.26-150000.6.26.1
libexiv2-26-32bit: before 0.26-150000.6.26.1
exiv2-lang: before 0.26-150000.6.26.1
libexiv2-doc: before 0.26-150000.6.26.1
libexiv2-devel: before 0.26-150000.6.26.1
libexiv2-26-debuginfo: before 0.26-150000.6.26.1
libexiv2-26: before 0.26-150000.6.26.1
exiv2-debugsource: before 0.26-150000.6.26.1
exiv2-debuginfo: before 0.26-150000.6.26.1
exiv2: before 0.26-150000.6.26.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20224276-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.