ID |
CVE-2018-12900
|
Summary |
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
|
CVSS |
Base: | 6.8 (as of 05-03-2021 - 19:15) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-787 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
redhat
via4
|
advisories | bugzilla | id | 1595575 | title | CVE-2018-12900 libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 8 is installed | oval | oval:com.redhat.rhba:tst:20193384074 |
OR | AND | comment | libtiff is earlier than 0:4.0.9-15.el8 | oval | oval:com.redhat.rhsa:tst:20193419001 |
comment | libtiff is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20110318007 |
|
AND | comment | libtiff-debugsource is earlier than 0:4.0.9-15.el8 | oval | oval:com.redhat.rhsa:tst:20193419003 |
comment | libtiff-debugsource is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20193419004 |
|
AND | comment | libtiff-devel is earlier than 0:4.0.9-15.el8 | oval | oval:com.redhat.rhsa:tst:20193419005 |
comment | libtiff-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20110318009 |
|
AND | comment | libtiff-tools is earlier than 0:4.0.9-15.el8 | oval | oval:com.redhat.rhsa:tst:20193419007 |
comment | libtiff-tools is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20161546008 |
|
|
|
|
| rhsa | id | RHSA-2019:3419 | released | 2019-11-05 | severity | Moderate | title | RHSA-2019:3419: libtiff security update (Moderate) |
|
| rpms | - libtiff-0:4.0.3-32.el7
- libtiff-debuginfo-0:4.0.3-32.el7
- libtiff-devel-0:4.0.3-32.el7
- libtiff-static-0:4.0.3-32.el7
- libtiff-tools-0:4.0.3-32.el7
- libtiff-0:4.0.9-15.el8
- libtiff-debuginfo-0:4.0.9-15.el8
- libtiff-debugsource-0:4.0.9-15.el8
- libtiff-devel-0:4.0.9-15.el8
- libtiff-tools-0:4.0.9-15.el8
- libtiff-tools-debuginfo-0:4.0.9-15.el8
|
|
refmap
via4
|
debian | DSA-4670 | misc | | mlist | [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update | ubuntu | |
|
Last major update |
05-03-2021 - 19:15 |
Published |
26-06-2018 - 22:29 |
Last modified |
05-03-2021 - 19:15 |