MGASA-2019-0101

Source
https://advisories.mageia.org/MGASA-2019-0101.html
Import Source
https://advisories.mageia.org/MGASA-2019-0101.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0101
Related
Published
2019-02-22T00:35:50Z
Modified
2019-02-22T00:03:04Z
Summary
Updated libtiff packages fix security vulnerability
Details

An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900. (CVE-2019-7663)

The invertImage() function in tiffcrop.c:9206 allows remote attackers to cause a denial of service (heap buffer overflow) via invert color space.

References
Credits

Affected packages

Mageia:6 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/mageia/libtiff?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.10-1.git20190219.1.mga6

Ecosystem specific

{
    "section": "core"
}