Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892663
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-2663-1)
Summary:The remote host is missing an update for the Debian 'libimage-exiftool-perl' package(s) announced via the DLA-2663-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libimage-exiftool-perl' package(s) announced via the DLA-2663-1 advisory.

Vulnerability Insight:
A vulnerability was discovered in libimage-exiftool-perl, a library and program to read and write meta information in multimedia files, which may result in execution of arbitrary code if a malformed DjVu file is processed.

For Debian 9 stretch, this problem has been fixed in version 10.40-1+deb9u1.

We recommend that you upgrade your libimage-exiftool-perl packages.

For the detailed security status of libimage-exiftool-perl please refer to its security tracker page at: [link moved to references]

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libimage-exiftool-perl' package(s) on Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-22204
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json
Debian Security Information: DSA-4910 (Google Search)
https://www.debian.org/security/2021/dsa-4910
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/
http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html
http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html
http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html
https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800
https://hackerone.com/reports/1154542
https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html
http://www.openwall.com/lists/oss-security/2021/05/09/1
http://www.openwall.com/lists/oss-security/2021/05/10/5
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.