Lucene search

K
openvasCopyright (C) 2021 Greenbone AGOPENVAS:1361412562310853803
HistoryMay 12, 2021 - 12:00 a.m.

openSUSE: Security Advisory for perl-Image-ExifTool (openSUSE-SU-2021:0707-1)

2021-05-1200:00:00
Copyright (C) 2021 Greenbone AG
plugins.openvas.org
11
perl-image-exiftool
opensuse
advisory
cve-2021-22204
update
format support
bug fixes
security vulnerability
metadata
jpeg xl
image files
gps information

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.967

Percentile

99.7%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.853803");
  script_version("2024-07-25T05:05:41+0000");
  script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
  script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
  script_cve_id("CVE-2021-22204");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-07-25 05:05:41 +0000 (Thu, 25 Jul 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-07-24 17:07:58 +0000 (Wed, 24 Jul 2024)");
  script_tag(name:"creation_date", value:"2021-05-12 03:03:13 +0000 (Wed, 12 May 2021)");
  script_name("openSUSE: Security Advisory for perl-Image-ExifTool (openSUSE-SU-2021:0707-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2021 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSELeap15\.2");

  script_xref(name:"Advisory-ID", value:"openSUSE-SU-2021:0707-1");
  script_xref(name:"URL", value:"https://lists.opensuse.org/archives/list/[email protected]/thread/SLQ4XG6SNL6OL7SHPBZLVWYCAEZGZW5X");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'perl-Image-ExifTool'
  package(s) announced via the openSUSE-SU-2021:0707-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for perl-Image-ExifTool fixes the following issues:

     Update to version 12.25 fixes (boo#1185547 CVE-2021-22204)

  * JPEG XL support is now official

  * Added read support for Medical Research Council (MRC) image files

  * Added ability to write a number of 3gp tags in video files

  * Added a new Sony PictureProfile value (thanks Jos Roost)

  * Added a new Sony LensType (thanks LibRaw)

  * Added a new Nikon LensID (thanks Niels Kristian Bech Jensen)

  * Added a new Canon LensType

  * Decode more GPS information from Blackvue dashcam videos

  * Decode a couple of new NikonSettings tags (thanks Warren Hatch)

  * Decode a few new RIFF tags

  * Improved Validate option to add minor warning if standard XMP is missing
       xpacket wrapper

  * Avoid decoding some large arrays in DNG images to improve performance
       unless the -m option is used

  * Patched bug that could give runtime warning when trying to write an
       empty XMP structure

  * Fixed decoding of ImageWidth/Height for JPEG XL images

  * Fixed problem were Microsoft Xtra tags couldn't be deleted

     version 12.24:

  * Added a new PhaseOne RawFormat value (thanks LibRaw)

  * Decode a new Sony tag (thanks Jos Roost)

  * Decode a few new Panasonic and FujiFilm tags (thanks LibRaw and
       Greybeard)

  * Patched security vulnerability in DjVu reader

  * Updated acdsee.config in distribution (thanks StarGeek)

  * Recognize AutoCAD DXF files

  * More work on experimental JUMBF read support

  * More work on experimental JPEG XL read/write support

     version 12.23:

  * Added support for Olympus ORI files

  * Added experimental read/write support for JPEG XL images

  * Added experimental read support for JUMBF metadata in JPEG and Jpeg2000
       images

  * Added built-in support for parsing GPS track from Denver ACG-8050 videos
       with the -ee option

  * Added a some new Sony lenses (thanks Jos Roost and LibRaw)

  * Changed priority of Samsung trailer tags so the first DepthMapImage
       takes precedence when -a is not used

  * Improved identification of M4A audio files

  * Patched to avoid escaping &#x27, &#x27  in 'Binary data' message when

  - struct is used

  * Removed Unknown flag from MXF VideoCodingSchemeID tag

  * Fixed -forcewrite=EXIF to apply to EXIF in binary header of EPS files

  * API Changes:
       + Added BlockExtract option

     version 12.22:

  * Added a few new Sony LensTypes and a new SonyModelID (thanks Jos Roost
       and LibRaw)

  * Added Extr ...

  Description truncated. Please see the references for more information.");

  script_tag(name:"affected", value:"'perl-Image-ExifTool' package(s) on openSUSE Leap 15.2.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "openSUSELeap15.2") {

  if(!isnull(res = isrpmvuln(pkg:"exiftool", rpm:"exiftool~12.25~lp152.4.3.1", rls:"openSUSELeap15.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"perl-File-RandomAccess", rpm:"perl-File-RandomAccess~12.25~lp152.4.3.1", rls:"openSUSELeap15.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"perl-Image-ExifTool", rpm:"perl-Image-ExifTool~12.25~lp152.4.3.1", rls:"openSUSELeap15.2"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.967

Percentile

99.7%