CVE-2018-7456
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
Published
2018-02-24T06:29:00.630
Last Modified
2024-11-21T04:12:10.560
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 6.5 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://bugzilla.maptools.org/show_bug.cgi?id=2778
Exploit, Issue Tracking, Third Party Advisory
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:2051
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:2053
([email protected])
-
https://github.com/xiaoqx/pocs/tree/master/libtiff
Exploit, Third Party Advisory
([email protected])
-
https://gitlab.com/libtiff/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b
Patch, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00010.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00011.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html
Mailing List, Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/3864-1/
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2018/dsa-4349
Third Party Advisory
([email protected])
-
http://bugzilla.maptools.org/show_bug.cgi?id=2778
Exploit, Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:2051
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:2053
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xiaoqx/pocs/tree/master/libtiff
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://gitlab.com/libtiff/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00010.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00011.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/3864-1/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2018/dsa-4349
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)