First published: Wed May 16 2018(Updated: )
A flaw was found in LibTIFF through 4.0.9. TIFFWriteDirectorySec() function in tif_dirwrite.c allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file. References: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2795">http://bugzilla.maptools.org/show_bug.cgi?id=2795</a> Patch: <a href="https://gitlab.com/libtiff/libtiff/commit/de144fd228e4be8aa484c3caf3d814b6fa88c6d9">https://gitlab.com/libtiff/libtiff/commit/de144fd228e4be8aa484c3caf3d814b6fa88c6d9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | <=4.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1579058 is classified as a denial of service vulnerability that can lead to application crashes.
To fix REDHAT-BUG-1579058, upgrade to LibTIFF version 4.0.10 or later where the issue is resolved.
The impact of REDHAT-BUG-1579058 allows remote attackers to trigger application crashes through crafted TIFF files.
LibTIFF versions up to and including 4.0.9 are affected by REDHAT-BUG-1579058.
There is currently no known workaround for REDHAT-BUG-1579058, and users are advised to upgrade to a fixed version.