Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3619 (GCVE-0-2016-3619)
Vulnerability from cvelistv5
Published
2016-10-03 16:00
Modified
2024-08-06 00:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
References
| URL | Tags | ||
|---|---|---|---|
|
|
|||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:03:34.265Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/85919"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-04-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-02T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/85919"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85919"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-3619",
"datePublished": "2016-10-03T16:00:00",
"dateReserved": "2016-03-21T00:00:00",
"dateUpdated": "2024-08-06T00:03:34.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-3619\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-10-03T16:09:00.180\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \\\"-c none\\\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n DumpModeEncode en tif_dumpmode.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \\\"-c none\\\" es usada, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (sobre lectura del b\u00fafer) a trav\u00e9s de una imagen BMP manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33708995-494C-476D-B0E3-1E78B9328699\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2567\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/85919\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/85919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
References
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"initial_release_date": "2017-03-28T00:00:00",
"last_revision_date": "2017-03-29T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
suse-su-2018:3879-1
Vulnerability from csaf_suse
Published
2018-11-23 16:06
Modified
2018-11-23 16:06
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
Security issues fixed:
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322).
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).
Non-security issues fixed:
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
Patchnames
sdksp4-tiff-13878,slessp4-tiff-13878
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).\n- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).\n- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). \n- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).\n- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).\n- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).\n- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).\n- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).\n- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)\n- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)\n- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).\n\nNon-security issues fixed:\n\n- asan_build: build ASAN included\n- debug_build: build more suitable for debugging\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-tiff-13878,slessp4-tiff-13878",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3879-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3879-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183879-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3879-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010163",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "self",
"summary": "SUSE Bug 1014461",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "self",
"summary": "SUSE Bug 1040080",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "self",
"summary": "SUSE Bug 1040322",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "self",
"summary": "SUSE Bug 1074186",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "self",
"summary": "SUSE Bug 1099257",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "self",
"summary": "SUSE Bug 1113672",
"url": "https://bugzilla.suse.com/1113672"
},
{
"category": "self",
"summary": "SUSE Bug 974446",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "self",
"summary": "SUSE Bug 974447",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "self",
"summary": "SUSE Bug 974448",
"url": "https://bugzilla.suse.com/974448"
},
{
"category": "self",
"summary": "SUSE Bug 983440",
"url": "https://bugzilla.suse.com/983440"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8870 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5319 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9273 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9273/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17942 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9117 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9147 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12900 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18661 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18661/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2018-11-23T16:06:18Z",
"generator": {
"date": "2018-11-23T16:06:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3879-1",
"initial_release_date": "2018-11-23T16:06:18Z",
"revision_history": [
{
"date": "2018-11-23T16:06:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product_id": "libtiff3-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.i586",
"product": {
"name": "tiff-3.8.2-141.169.22.1.i586",
"product_id": "tiff-3.8.2-141.169.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-x86-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product_id": "tiff-3.8.2-141.169.22.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product_id": "tiff-3.8.2-141.169.22.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product": {
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product_id": "tiff-3.8.2-141.169.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product_id": "tiff-3.8.2-141.169.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-8870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8870"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8870",
"url": "https://www.suse.com/security/cve/CVE-2015-8870"
},
{
"category": "external",
"summary": "SUSE Bug 1014461 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2015-8870"
},
{
"cve": "CVE-2016-3619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3619"
}
],
"notes": [
{
"category": "general",
"text": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3619",
"url": "https://www.suse.com/security/cve/CVE-2016-3619"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974446 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3619"
},
{
"cve": "CVE-2016-3620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3620"
}
],
"notes": [
{
"category": "general",
"text": "The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c zip\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3620",
"url": "https://www.suse.com/security/cve/CVE-2016-3620"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/974447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3620"
},
{
"cve": "CVE-2016-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3621"
}
],
"notes": [
{
"category": "general",
"text": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3621",
"url": "https://www.suse.com/security/cve/CVE-2016-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3621"
},
{
"cve": "CVE-2016-5319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5319"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5319",
"url": "https://www.suse.com/security/cve/CVE-2016-5319"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-5319"
},
{
"cve": "CVE-2016-9273",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9273"
}
],
"notes": [
{
"category": "general",
"text": "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9273",
"url": "https://www.suse.com/security/cve/CVE-2016-9273"
},
{
"category": "external",
"summary": "SUSE Bug 1010163 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "external",
"summary": "SUSE Bug 1017693 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1017693"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-9273"
},
{
"cve": "CVE-2017-17942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17942"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17942",
"url": "https://www.suse.com/security/cve/CVE-2017-17942"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-17942"
},
{
"cve": "CVE-2017-9117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9117"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9117",
"url": "https://www.suse.com/security/cve/CVE-2017-9117"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9117"
},
{
"cve": "CVE-2017-9147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9147"
}
],
"notes": [
{
"category": "general",
"text": "LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9147",
"url": "https://www.suse.com/security/cve/CVE-2017-9147"
},
{
"category": "external",
"summary": "SUSE Bug 1040322 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9147"
},
{
"cve": "CVE-2018-12900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12900"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12900",
"url": "https://www.suse.com/security/cve/CVE-2018-12900"
},
{
"category": "external",
"summary": "SUSE Bug 1099257 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "external",
"summary": "SUSE Bug 1125113 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1125113"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-12900"
},
{
"cve": "CVE-2018-18661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18661"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18661",
"url": "https://www.suse.com/security/cve/CVE-2018-18661"
},
{
"category": "external",
"summary": "SUSE Bug 1113672 for CVE-2018-18661",
"url": "https://bugzilla.suse.com/1113672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2018-18661"
}
]
}
fkie_cve-2016-3619
Vulnerability from fkie_nvd
Published
2016-10-03 16:09
Modified
2025-04-12 10:46
Severity ?
Summary
The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "33708995-494C-476D-B0E3-1E78B9328699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
},
{
"lang": "es",
"value": "La funci\u00f3n DumpModeEncode en tif_dumpmode.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \"-c none\" es usada, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (sobre lectura del b\u00fafer) a trav\u00e9s de una imagen BMP manipulada."
}
],
"id": "CVE-2016-3619",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-10-03T16:09:00.180",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201701-16"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2016-02093
Vulnerability from cnvd
Title
Silicon Graphics LibTiff bmp2tiff工具拒绝服务漏洞
Description
Silicon Graphics LibTiff是一个读写TIFF文件的库。该库包含一些处理TIFF文件的命令行工具。
Silicon Graphics LibTiff的bmp2tiff工具中的‘DumpModeEncode’函数存在拒绝服务漏洞,允许攻击者利用带有‘-c lzw’参数的bmp图像,诱使应用解析,使应用程序崩溃。
Severity
中
VLAI Severity ?
Patch Name
Silicon Graphics LibTiff bmp2tiff工具拒绝服务漏洞的补丁
Patch Description
Silicon Graphics LibTiff是一个读写TIFF文件的库。该库包含一些处理TIFF文件的命令行工具。
Silicon Graphics LibTiff的bmp2tiff工具中的‘DumpModeEncode’函数存在拒绝服务漏洞,允许攻击者利用带有‘-c lzw’参数的bmp图像,诱使应用解析,使应用程序崩溃。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://www.libtiff.org/
Reference
http://www.openwall.com/lists/oss-security/2016/04/07/1
Impacted products
| Name | Silicon Graphics, Inc. LibTiff <=4.0.6 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-3619"
}
},
"description": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684\u2018DumpModeEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "Mei Wang of the Cloud Security Team, Qihoo 360",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.libtiff.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-02093",
"openTime": "2016-04-11",
"patchDescription": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684\u2018DumpModeEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Silicon Graphics, Inc. LibTiff \u003c=4.0.6"
},
"referenceLink": "http://www.openwall.com/lists/oss-security/2016/04/07/1",
"serverity": "\u4e2d",
"submitTime": "2016-04-09",
"title": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
ghsa-qwfp-646h-7pm7
Vulnerability from github
Published
2022-05-17 01:18
Modified
2022-05-17 01:18
Severity ?
VLAI Severity ?
Details
The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
{
"affected": [],
"aliases": [
"CVE-2016-3619"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-10-03T16:09:00Z",
"severity": "MODERATE"
},
"details": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GHSA-qwfp-646h-7pm7",
"modified": "2022-05-17T01:18:14Z",
"published": "2022-05-17T01:18:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3619"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"type": "WEB",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1035508"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2016-3619
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-3619",
"description": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3619",
"references": [
"https://www.suse.com/security/cve/CVE-2016-3619.html",
"https://security.archlinux.org/CVE-2016-3619"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-3619"
],
"details": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3619",
"modified": "2023-12-13T01:21:28.174761Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85919"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/85919"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "1035508",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1035508"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2017-09-03T01:29Z",
"publishedDate": "2016-10-03T16:09Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…