[manjaro-security] [ASA-201811-17] libtiff: multiple issues
santiago at archlinux.org
Tue Nov 20 19:51:06 CET 2018
Arch Linux Security Advisory ASA-201811-17
Date : 2018-11-20
CVE-ID : CVE-2017-9935 CVE-2017-11613 CVE-2018-18557 CVE-2018-18661
Package : libtiff
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-790
The package libtiff before version 4.0.10-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 4.0.10-1.
# pacman -Syu "libtiff>=4.0.10-1"
The problems have been fixed upstream in version 4.0.10.
- CVE-2017-9935 (arbitrary code execution)
In LibTIFF before 4.0.10, there is a heap-based buffer overflow in the
t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could
lead to different damages. For example, a crafted TIFF document can
lead to an out-of-bounds read in TIFFCleanup, an invalid free in
TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or
a double free in t2p_free. Given these possibilities, it probably could
cause arbitrary code execution.
- CVE-2017-11613 (denial of service)
In LibTIFF before 4.0.10, there is a denial of service vulnerability in
the TIFFOpen function triggered by resource consumption via crafted
input files. During the TIFFOpen process, td_imagelength is not
checked. The value of td_imagelength can be directly controlled by an
input file. In the ChopUpSingleUncompressedStrip function, the
_TIFFCheckMalloc function is called based on td_imagelength. If we set
the value of td_imagelength close to the amount of system memory, it
will hang the system or trigger the OOM killer.
- CVE-2018-18557 (arbitrary code execution)
LibTIFF before 4.0.10 (with JBIG enabled) decodes arbitrarily-sized
JBIG into a buffer, ignoring the buffer size, which leads to a
tif_jbig.c JBIGDecode out-of-bounds write.
- CVE-2018-18661 (denial of service)
A null-pointer dereference has been found in LibTIFF before 4.0.10 in
the LZWDecode() function in the file tif_lzw.c.
A remote attacker might be able to cause a denial of service or execute
arbitrary code on the affected host via a crafted picture file.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the manjaro-security