First published: Sun Sep 16 2018(Updated: )
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.0.9-6<=4.0.8-2 | 4.0.8-2+deb9u5 4.0.8-2+deb9u3 4.0.9+git181026-1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
Debian | =8.0 | |
libtiff | =4.0.9 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17100 is classified as a denial of service vulnerability due to an integer overflow leading to a possible crash.
To mitigate CVE-2018-17100, users should upgrade to the patched versions of LibTIFF or the affected applications as specified by the respective vendors.
CVE-2018-17100 affects LibTIFF version 4.0.9, and certain other specific versions of applications that utilize LibTIFF.
While CVE-2018-17100 primarily causes denial of service, it does not explicitly indicate potential data loss but could disrupt normal operations.
Currently, there is no known public exploit for CVE-2018-17100, but it is advisable to apply updates to prevent potential attacks.