6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
Low
0.013 Low
EPSS
Percentile
85.9%
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the application,
leading to a denial of service, or possibly execute arbitrary code with
user privileges. This issue was only fixed in Ubuntu 14.04 ESM.
(CVE-2019-14973, CVE-2019-17546, CVE-2020-35523, CVE-2020-35524,
CVE-2022-3970)
It was discovered that LibTIFF was incorrectly acessing a data structure
when processing data with the tiffcrop tool, which could lead to a heap
buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2022-48281)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libtiff5 | < 4.0.6-1ubuntu0.8+esm9 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff-doc | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff-opengl | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff-opengl-dbgsym | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff-tools | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff-tools-dbgsym | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff5 | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff5-dbgsym | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiff5-dev | < 4.0.6-1ubuntu0.8 | UNKNOWN |
Ubuntu | 16.04 | noarch | libtiffxx5 | < 4.0.6-1ubuntu0.8 | UNKNOWN |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
Low
0.013 Low
EPSS
Percentile
85.9%