First published: Mon Mar 26 2018(Updated: )
It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libtiff-tools | <4.0.8-5ubuntu0.1 | 4.0.8-5ubuntu0.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libtiff5 | <4.0.8-5ubuntu0.1 | 4.0.8-5ubuntu0.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libtiff-tools | <4.0.6-1ubuntu0.4 | 4.0.6-1ubuntu0.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/libtiff5 | <4.0.6-1ubuntu0.4 | 4.0.6-1ubuntu0.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/libtiff-tools | <4.0.3-7ubuntu0.9 | 4.0.3-7ubuntu0.9 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libtiff5 | <4.0.3-7ubuntu0.9 | 4.0.3-7ubuntu0.9 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-3606-1 is classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix USN-3606-1, upgrade the affected LibTIFF packages to the recommended versions specified in the advisory.
USN-3606-1 affects Ubuntu versions 14.04, 16.04, and 17.10 with specific LibTIFF package versions.
USN-3606-1 is a memory corruption vulnerability in LibTIFF that can be exploited through specially crafted images.
Yes, USN-3606-1 may allow remote attackers to execute arbitrary code if a user opens a malicious image.