6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.5%
Package : tiff
Version : 4.0.3-12.3+deb8u6
CVE ID : CVE-2017-11613 CVE-2018-5784 CVE-2018-7456
CVE-2018-8905 CVE-2018-10963
Debian Bug : 869823 898348 890441 891288 893806
Several issues were discovered in TIFF, the Tag Image File Format
library, that allowed remote attackers to cause a denial-of-service or
other unspecified impact via a crafted image file.
CVE-2017-11613: DoS vulnerability
A crafted input will lead to a denial of service attack. During the
TIFFOpen process, td_imagelength is not checked. The value of
td_imagelength can be directly controlled by an input file. In the
ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc
function is called based on td_imagelength. If the value of
td_imagelength is set close to the amount of system memory, it will
hang the system or trigger the OOM killer.
CVE-2018-10963: DoS vulnerability
The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF
allows remote attackers to cause a denial of service (assertion
failure and application crash) via a crafted file, a different
vulnerability than CVE-2017-13726.
CVE-2018-5784: DoS vulnerability
In LibTIFF, there is an uncontrolled resource consumption in the
TIFFSetDirectory function of tif_dir.c. Remote attackers could
leverage this vulnerability to cause a denial of service via a
crafted tif file.
This occurs because the declared number of directory entries is not
validated against the actual number of directory entries.
CVE-2018-7456: NULL Pointer Dereference
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory
in tif_print.c in LibTIFF when using the tiffinfo tool to print
crafted TIFF information, a different vulnerability than
CVE-2017-18013. (This affects an earlier part of the
TIFFPrintDirectory function that was not addressed by the
CVE-2017-18013 patch.)
CVE-2018-8905: Heap-based buffer overflow
In LibTIFF, a heap-based buffer overflow occurs in the function
LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as
demonstrated by tiff2ps.
For Debian 8 "Jessie", these problems have been fixed in version
4.0.3-12.3+deb8u6.
We recommend that you upgrade your tiff packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | amd64 | libtiff5-dbgsym | < 4.0.8-2+deb9u4 | libtiff5-dbgsym_4.0.8-2+deb9u4_amd64.deb |
Debian | 7 | armhf | libtiff4 | < 3.9.6-11+deb7u10 | libtiff4_3.9.6-11+deb7u10_armhf.deb |
Debian | 7 | armhf | libtiffxx5 | < 4.0.2-6+deb7u19 | libtiffxx5_4.0.2-6+deb7u19_armhf.deb |
Debian | 8 | amd64 | libtiff5 | < 4.0.3-12.3+deb8u6 | libtiff5_4.0.3-12.3+deb8u6_amd64.deb |
Debian | 7 | armhf | libtiff5-dev | < 4.0.2-6+deb7u19 | libtiff5-dev_4.0.2-6+deb7u19_armhf.deb |
Debian | 9 | s390x | libtiff5-dev | < 4.0.8-2+deb9u4 | libtiff5-dev_4.0.8-2+deb9u4_s390x.deb |
Debian | 7 | armel | libtiff5 | < 4.0.2-6+deb7u19 | libtiff5_4.0.2-6+deb7u19_armel.deb |
Debian | 9 | mips64el | libtiff-opengl-dbgsym | < 4.0.8-2+deb9u4 | libtiff-opengl-dbgsym_4.0.8-2+deb9u4_mips64el.deb |
Debian | 7 | i386 | libtiff4-dev | < 3.9.6-11+deb7u10 | libtiff4-dev_3.9.6-11+deb7u10_i386.deb |
Debian | 9 | mipsel | libtiff5-dev | < 4.0.8-2+deb9u4 | libtiff5-dev_4.0.8-2+deb9u4_mipsel.deb |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.5%