CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
47.0%
USN-6644-1 fixed vulnerabilities in LibTIFF.
This update provides the corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to crash, resulting
in a denial of service. (CVE-2023-52356)
It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-6228)
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to consume
resources, resulting in a denial of service. (CVE-2023-6277)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | libtiff-tools | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff-dev | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff-doc | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff-opengl | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff-opengl-dbgsym | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff-tools-dbgsym | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff5 | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff5-dbgsym | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiff5-dev | < 4.3.0-6ubuntu0.8 | UNKNOWN |
Ubuntu | 22.04 | noarch | libtiffxx5 | < 4.3.0-6ubuntu0.8 | UNKNOWN |