First published: Wed Sep 19 2018(Updated: )
An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. Upstream issue: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2807">http://bugzilla.maptools.org/show_bug.cgi?id=2807</a> Upstream patch: <a href="https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=f1b94e8a3ba49febdd3361c0214a1d1149251577">https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=f1b94e8a3ba49febdd3361c0214a1d1149251577</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1631078 is considered critical due to the potential for denial of service and application crashes.
To fix REDHAT-BUG-1631078, update to the latest version of LibTIFF that addresses the out-of-bounds writes.
REDHAT-BUG-1631078 affects versions of LibTIFF prior to the latest release that resolves the identified vulnerabilities.
REDHAT-BUG-1631078 involves out-of-bounds write vulnerabilities that can lead to application crashes.
While REDHAT-BUG-1631078 is primarily a denial of service issue, it may potentially lead to data exposure depending on the crafted image file used.