First published: Thu May 10 2018(Updated: )
A flaw was found in LibTIFF through 4.0.9. TIFFWriteDirectorySec() function in tif_dirwrite.c allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file. References: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2795">http://bugzilla.maptools.org/show_bug.cgi?id=2795</a> Patch: <a href="https://gitlab.com/libtiff/libtiff/commit/de144fd228e4be8aa484c3caf3d814b6fa88c6d9">https://gitlab.com/libtiff/libtiff/commit/de144fd228e4be8aa484c3caf3d814b6fa88c6d9</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
tiff | <=4.0.9 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10963 is classified as a denial of service vulnerability due to application crashes caused by crafted TIFF files.
To fix CVE-2018-10963, update LibTIFF to version 4.0.10 or higher to avoid the vulnerability.
CVE-2018-10963 affects LibTIFF versions up to 4.0.9 and may affect various distributions that include this library.
CVE-2018-10963 can be exploited through the delivery of crafted TIFF files that cause application crashes.
Check if your Debian or Ubuntu system has updated LibTIFF to version 4.0.10 or later to ensure CVE-2018-10963 is fixed.