First published: Wed Sep 19 2018(Updated: )
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. Upstream issue: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2810">http://bugzilla.maptools.org/show_bug.cgi?id=2810</a> Upstream patch: <a href="https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=6da1fb3f64d43be37e640efbec60400d1f1ac39e">https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=6da1fb3f64d43be37e640efbec60400d1f1ac39e</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1631069 is a vulnerability in LibTIFF 4.0.9 involving an int32 overflow that can lead to denial of service or other unspecified impacts when processing crafted image files.
The impact of REDHAT-BUG-1631069 can result in application crashes and may allow attackers to exploit the vulnerability for further unspecified consequences.
To mitigate REDHAT-BUG-1631069, update to the latest patched version of LibTIFF that addresses the int32 overflow vulnerability.
REDHAT-BUG-1631069 specifically affects LibTIFF version 4.0.9; other versions may not be impacted.
The vulnerability in REDHAT-BUG-1631069 can be triggered by crafted image files processed by the LibTIFF library.