ID CVE-2019-14973
Summary _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
References
Vulnerable Configurations
  • cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:3.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:3.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:alpha:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta5:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta5:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0:beta6:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0:beta6:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:alpha:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:alpha:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:alpha4:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:alpha4:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:alpha5:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:alpha5:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:alpha6:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:alpha6:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.0:beta7:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.0:beta7:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.4:-:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.4:-:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.4:beta:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.4:beta:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:libtiff:libtiff:4.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.10:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 06-11-2020 - 01:15)
Impact:
Exploitability:
CWE CWE-190
CAPEC
  • Forced Integer Overflow
    This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 1745951
title CVE-2019-14973 libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 8 is installed
      oval oval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • comment libtiff is earlier than 0:4.0.9-17.el8
          oval oval:com.redhat.rhsa:tst:20201688001
        • comment libtiff is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110318007
      • AND
        • comment libtiff-debugsource is earlier than 0:4.0.9-17.el8
          oval oval:com.redhat.rhsa:tst:20201688003
        • comment libtiff-debugsource is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20193419004
      • AND
        • comment libtiff-devel is earlier than 0:4.0.9-17.el8
          oval oval:com.redhat.rhsa:tst:20201688005
        • comment libtiff-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110318009
      • AND
        • comment libtiff-tools is earlier than 0:4.0.9-17.el8
          oval oval:com.redhat.rhsa:tst:20201688007
        • comment libtiff-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161546008
rhsa
id RHSA-2020:1688
released 2020-04-28
severity Moderate
title RHSA-2020:1688: libtiff security update (Moderate)
rpms
  • libtiff-0:4.0.9-17.el8
  • libtiff-debuginfo-0:4.0.9-17.el8
  • libtiff-debugsource-0:4.0.9-17.el8
  • libtiff-devel-0:4.0.9-17.el8
  • libtiff-tools-0:4.0.9-17.el8
  • libtiff-tools-debuginfo-0:4.0.9-17.el8
  • libtiff-0:4.0.3-35.el7
  • libtiff-debuginfo-0:4.0.3-35.el7
  • libtiff-devel-0:4.0.3-35.el7
  • libtiff-static-0:4.0.3-35.el7
  • libtiff-tools-0:4.0.3-35.el7
refmap via4
bugtraq
  • 20191104 [slackware-security] libtiff (SSA:2019-308-01)
  • 20200121 [SECURITY] [DSA 4608-1] tiff security update
confirm https://gitlab.com/libtiff/libtiff/merge_requests/90
debian
  • DSA-4608
  • DSA-4670
fedora
  • FEDORA-2019-6eeff0f801
  • FEDORA-2019-e45019c690
misc http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html
mlist [debian-lts-announce] 20190825 [SECURITY] [DLA 1897-1] tiff security update
suse
  • openSUSE-SU-2020:1561
  • openSUSE-SU-2020:1840
Last major update 06-11-2020 - 01:15
Published 14-08-2019 - 06:15
Last modified 06-11-2020 - 01:15
Back to Top