Debian DLA-2975-1 : openjpeg2 - LTS security update

medium Nessus Plugin ID 159625

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-2975 advisory.

- There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability. (CVE-2020-27842)

- A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system availability. (CVE-2020-27843)

- Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option -ImgDir on a directory that contains 1048576 files. (CVE-2021-29338)

- A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service. (CVE-2022-1122)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the openjpeg2 packages.

For Debian 9 stretch, these problems have been fixed in version 2.1.2-1.1+deb9u7.

See Also

https://security-tracker.debian.org/tracker/source-package/openjpeg2

https://www.debian.org/lts/security/2022/dla-2975

https://security-tracker.debian.org/tracker/CVE-2020-27842

https://security-tracker.debian.org/tracker/CVE-2020-27843

https://security-tracker.debian.org/tracker/CVE-2021-29338

https://security-tracker.debian.org/tracker/CVE-2022-1122

https://packages.debian.org/source/stretch/openjpeg2

Plugin Details

Severity: Medium

ID: 159625

File Name: debian_DLA-2975.nasl

Version: 1.4

Type: local

Agent: unix

Published: 4/10/2022

Updated: 11/2/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2020-27843

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5.1

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2022-1122

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libopenjp2-7, p-cpe:/a:debian:debian_linux:libopenjp2-7-dbg, p-cpe:/a:debian:debian_linux:libopenjp2-7-dev, p-cpe:/a:debian:debian_linux:libopenjp2-tools, p-cpe:/a:debian:debian_linux:libopenjp3d-tools, p-cpe:/a:debian:debian_linux:libopenjp3d7, p-cpe:/a:debian:debian_linux:libopenjpip-dec-server, p-cpe:/a:debian:debian_linux:libopenjpip-server, p-cpe:/a:debian:debian_linux:libopenjpip-viewer, p-cpe:/a:debian:debian_linux:libopenjpip7, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2022

Vulnerability Publication Date: 12/17/2020

Reference Information

CVE: CVE-2020-27842, CVE-2020-27843, CVE-2021-29338, CVE-2022-1122