MGASA-2018-0493

Source
https://advisories.mageia.org/MGASA-2018-0493.html
Import Source
https://advisories.mageia.org/MGASA-2018-0493.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0493
Related
Published
2018-12-29T23:24:32Z
Modified
2018-12-29T22:57:18Z
Summary
Updated libtiff packages fix security vulnerabilities
Details

Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file. (CVE-2018-12900)

LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write. (CVE-2018-18557)

In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset. (CVE-2018-19210)

References
Credits

Affected packages