First published: Thu Sep 13 2018(Updated: )
A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.0.9-6<=4.0.8-2 | 4.0.8-2+deb9u5 4.0.10-4 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
libtiff | =4.0.9 | |
Debian | =8.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17000 is classified as a denial-of-service vulnerability.
To fix CVE-2018-17000, upgrade to LibTIFF version 4.0.10 or any higher version available.
CVE-2018-17000 affects LibTIFF versions up to 4.0.9, specifically impacting TIFF file processing.
Yes, CVE-2018-17000 can be exploited remotely through crafted TIFF files.
LibTIFF versions 4.0.9 and lower, as well as certain versions of IBM Cognos Analytics, are vulnerable to CVE-2018-17000.