An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libtiff-doc": "4.0.3-7ubuntu0.6", "libtiff5-dbgsym": "4.0.3-7ubuntu0.6", "libtiff-opengl": "4.0.3-7ubuntu0.6", "libtiffxx5-dbgsym": "4.0.3-7ubuntu0.6", "libtiff4-dev": "4.0.3-7ubuntu0.6", "libtiff-opengl-dbgsym": "4.0.3-7ubuntu0.6", "libtiff-tools-dbgsym": "4.0.3-7ubuntu0.6", "libtiff5": "4.0.3-7ubuntu0.6", "libtiff5-alt-dev": "4.0.3-7ubuntu0.6", "libtiff-tools": "4.0.3-7ubuntu0.6", "libtiffxx5": "4.0.3-7ubuntu0.6", "libtiff5-dev": "4.0.3-7ubuntu0.6" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libtiff-doc": "4.0.6-1ubuntu0.1", "libtiff5-dbgsym": "4.0.6-1ubuntu0.1", "libtiff-opengl": "4.0.6-1ubuntu0.1", "libtiffxx5-dbgsym": "4.0.6-1ubuntu0.1", "libtiff-opengl-dbgsym": "4.0.6-1ubuntu0.1", "libtiff-tools-dbgsym": "4.0.6-1ubuntu0.1", "libtiff5": "4.0.6-1ubuntu0.1", "libtiff-tools": "4.0.6-1ubuntu0.1", "libtiffxx5": "4.0.6-1ubuntu0.1", "libtiff5-dev": "4.0.6-1ubuntu0.1" } ] }