Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:CF99469AEE85FAA4A2723DEF330B8E4B
HistoryApr 29, 2023 - 12:00 a.m.

USN-5952-1: OpenJPEG vulnerabilities | Cloud Foundry

2023-04-2900:00:00
Cloud Foundry
www.cloudfoundry.org
12
openjpeg
vulnerabilities
canonical ubuntu
18.04
lts
usn-5952-1
medium
update
cloud foundry
cflinuxfs3
cf deployment
cve-2020-27842
cve-2020-27845
cve-2020-27814
cve-2020-27841
cve-2020-6851
cve-2020-27824
cve-2020-27843
cve-2020-8112
cve-2020-27823
cve-2020-15389.

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.019 Low

EPSS

Percentile

88.7%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 18.04

Description

Sebastian Poeplau discovered that OpenJPEG incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2020-6851, CVE-2020-8112) It was discovered that OpenJPEG incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2020-15389, CVE-2020-27814, CVE-2020-27823, CVE-2020-27824, CVE-2020-27841, CVE-2020-27845) It was discovered that OpenJPEG incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2020-27842, CVE-2020-27843) Update Instructions: Run sudo pro fix USN-5952-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-tools – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjpip-server – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjpip-viewer – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjp3d-tools – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjpip7 – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjp2-7 – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjp2-7-dev – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjp3d7 – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 libopenjpip-dec-server – 2.1.2-1.1+deb9u6ubuntu0.1~esm3 Available with Ubuntu Pro: https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2020-27842, CVE-2020-27845, CVE-2020-27814, CVE-2020-27841, CVE-2020-6851, CVE-2020-27824, CVE-2020-27843, CVE-2020-8112, CVE-2020-27823, CVE-2020-15389.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • cflinuxfs3
    • All versions prior to 0.357.0
  • CF Deployment
    • All versions prior to 27.4.0

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs3
    • Upgrade all versions to 0.357.0 or greater
  • CF Deployment
    • Upgrade all versions to 27.4.0 or greater

References

History

2023-04-29: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundrygorouterRange<0.357.0
OR
cloudfoundrycf-deploymentRange<27.4.0
CPENameOperatorVersion
cflinuxfs3lt0.357.0
cf deploymentlt27.4.0

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.019 Low

EPSS

Percentile

88.7%