Updated libtiff packages fix security vulnerability
Publication date: 06 Feb 2018Modification date: 25 Feb 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-17095 , CVE-2017-9935 , CVE-2017-18013
Description
tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file. (CVE-2017-17095) In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution. (CVE-2017-9935) In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash. (CVE-2017-18013)
References
- https://bugs.mageia.org/show_bug.cgi?id=22120
- http://openwall.com/lists/oss-security/2017/12/02/1
- https://lists.opensuse.org/opensuse-updates/2018-01/msg00041.html
- https://www.debian.org/security/2018/dsa-4100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18013
SRPMS
5/core
- libtiff-4.0.9-1.1.mga5
6/core
- libtiff-4.0.9-1.1.mga6