First published: Thu Mar 15 2018(Updated: )
LibTIFF through version 4.0.9 is vulnerable to a NULL pointer dereference in tif_print.c:TIFFPrintDirectory(). An attacker exploit this to cause a denial of service using the tiffinfo command with a crafted TIFF image. This is a different issue to <a href="https://access.redhat.com/security/cve/CVE-2017-18013">CVE-2017-18013</a>. Upstream Bug: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2778">http://bugzilla.maptools.org/show_bug.cgi?id=2778</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | <=4.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1556708 is classified as a denial of service vulnerability due to a NULL pointer dereference.
To fix REDHAT-BUG-1556708, update LibTIFF to version 4.0.10 or later.
REDHAT-BUG-1556708 affects LibTIFF versions up to and including 4.0.9.
An attacker can exploit REDHAT-BUG-1556708 to cause a denial of service by using a crafted TIFF image.
The vulnerable function in LibTIFF related to REDHAT-BUG-1556708 is TIFFPrintDirectory in tif_print.c.