Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-11613
HistoryJul 26, 2017 - 12:00 a.m.

CVE-2017-11613

2017-07-2600:00:00
ubuntu.com
ubuntu.com
16

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.009 Low

EPSS

Percentile

82.4%

In LibTIFF 4.0.8, there is a denial of service vulnerability in the
TIFFOpen function. A crafted input will lead to a denial of service attack.
During the TIFFOpen process, td_imagelength is not checked. The value of
td_imagelength can be directly controlled by an input file. In the
ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is
called based on td_imagelength. If we set the value of td_imagelength close
to the amount of system memory, it will hang the system or trigger the OOM
killer.

Bugs

Notes

Author Note
mdeslaur we will not be fixing this issue in precise/esm
OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchtiff< 4.0.8-5ubuntu0.1UNKNOWN
ubuntu14.04noarchtiff< 4.0.3-7ubuntu0.9UNKNOWN
ubuntu16.04noarchtiff< 4.0.6-1ubuntu0.4UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.009 Low

EPSS

Percentile

82.4%