First published: Mon May 07 2018(Updated: )
A flaw was found in LibTIFF 3.8.2 in TIFFWriteScanline function in tif_write.c. A heap-based buffer over-read, as demonstrated by bmp2tiff. References: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2788">http://bugzilla.maptools.org/show_bug.cgi?id=2788</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
tiff | =3.8.2 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10779 is classified with a medium severity level due to its potential for heap-based buffer over-read vulnerabilities.
To fix CVE-2018-10779, update LibTIFF to version 4.2.0-1+deb11u5 or higher.
CVE-2018-10779 affects LibTIFF version 3.8.2 and other versions prior to the recommended updates.
CVE-2018-10779 can be exploited if an attacker manages to manipulate TIFF files processed by affected software.
CVE-2018-10779 impacts various platforms including Debian and Ubuntu distributions with specified versions of the tiff package.