First published: Mon Jun 26 2017(Updated: )
In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
tiff | =4.0.8 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9936 is classified as a denial of service vulnerability due to memory leaks.
To mitigate CVE-2017-9936, upgrade to the fixed versions 4.2.0-1+deb11u5, 4.2.0-1+deb11u6, 4.5.0-6+deb12u2, 4.5.0-6+deb12u1, or 4.5.1+git230720-5.
CVE-2017-9936 affects LibTIFF version 4.0.8 and various Debian and Ubuntu packages that use this version.
Yes, a crafted TIFF document can be used to exploit CVE-2017-9936, potentially leading to a remote denial of service attack.
The exploitation of CVE-2017-9936 may result in excessive memory usage, leading to application crashes or system instability.