MGASA-2018-0109

Source
https://advisories.mageia.org/MGASA-2018-0109.html
Import Source
https://advisories.mageia.org/MGASA-2018-0109.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0109
Related
Published
2018-02-06T06:25:44Z
Modified
2018-02-25T14:25:24Z
Summary
Updated libtiff packages fix security vulnerability
Details

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file. (CVE-2017-17095)

In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2pwritepdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2pfree, memory corruption in t2preadwritepdfimage, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution. (CVE-2017-9935)

In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash. (CVE-2017-18013)

References
Credits

Affected packages