First published: Mon Jun 26 2017(Updated: )
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | =4.0.3 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8127 is considered a denial of service vulnerability that can potentially crash the application.
To fix CVE-2014-8127, you should upgrade to LibTIFF version 4.1.0 or higher as the vulnerability has been addressed in these versions.
CVE-2014-8127 affects LibTIFF version 4.0.3 and potentially other versions prior to 4.1.0.
Yes, CVE-2014-8127 can be exploited remotely through crafted TIFF images.
CVE-2014-8127 is associated with denial of service attacks that result from out-of-bounds read vulnerabilities.