||The (1) cpStrips and (2) cpTiles functions in the thumbnail tool in LibTIFF 4.0.6 and earlier allow remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the bytecounts array variable.
|Base: ||5.0 (as of 06-10-2016 - 10:51)|
An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
|NASL family||Gentoo Local Security Checks |
|NASL id||GENTOO_GLSA-201701-16.NASL |
|description||The remote host is affected by the vulnerability described in GLSA-201701-16 (libTIFF: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifier and bug reports referenced for details.
A remote attacker could entice a user to process a specially crafted image file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time. |
|last seen||2019-02-21 |
|plugin id||96373 |
|title||GLSA-201701-16 : libTIFF: Multiple vulnerabilities |
|NASL family||Debian Local Security Checks |
|NASL id||DEBIAN_DLA-693.NASL |
|description||Version 4.0.2-6+deb7u7 introduced changes that resulted in libtiff being unable to write out tiff files when the compression scheme in use relies on codec-specific TIFF tags embedded in the image.
This problem manifested itself with errors like those: $ tiffcp -r 16
-c jpeg sample.tif out.tif _TIFFVGetField: out.tif: Invalid tag 'Predictor' (not supported by codec). _TIFFVGetField: out.tif: Invalid tag 'BadFaxLines' (not supported by codec). tiffcp:
tif_dirwrite.c:687: TIFFWriteDirectorySec: Assertion `0' failed.
For Debian 7 'Wheezy', these problems have been fixed in version 4.0.2-6+deb7u10.
We recommend that you upgrade your tiff packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
|last seen||2019-02-21 |
|plugin id||94474 |
|title||Debian DLA-693-2 : tiff regression update |
|mlist||[oss-security] 20160408 CVE-2016-3631 - libtiff 4.0.6 illegel read |
|Last major update
||06-10-2016 - 13:19
||03-10-2016 - 12:09
||30-10-2018 - 12:27