Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3621 (GCVE-0-2016-3621)
Vulnerability from cvelistv5
Published
2016-10-03 16:00
Modified
2024-08-06 00:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:03:34.355Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-16"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-04-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-02T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-16"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2565",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-3621",
"datePublished": "2016-10-03T16:00:00",
"dateReserved": "2016-03-21T00:00:00",
"dateUpdated": "2024-08-06T00:03:34.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-3621\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-10-03T16:09:02.897\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \\\"-c lzw\\\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n LZWEncode en tif_lzw.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \\\"-c lzw\\\" es utilizada, permite a atacantes remotos provocar una denegaci\u00f3n de servicios (sobre lectura de b\u00fafer) a trav\u00e9s de una imagen BMP manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.6\",\"matchCriteriaId\":\"7DBB051D-E94D-4553-88A6-750BE80B7617\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2565\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
fkie_cve-2016-3621
Vulnerability from fkie_nvd
Published
2016-10-03 16:09
Modified
2025-04-12 10:46
Severity ?
Summary
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://bugzilla.maptools.org/show_bug.cgi?id=2565 | Issue Tracking | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/04/07/3 | Third Party Advisory | |
| cve@mitre.org | http://www.securitytracker.com/id/1035508 | ||
| cve@mitre.org | https://security.gentoo.org/glsa/201701-16 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.maptools.org/show_bug.cgi?id=2565 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/04/07/3 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035508 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBB051D-E94D-4553-88A6-750BE80B7617",
"versionEndIncluding": "4.0.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
},
{
"lang": "es",
"value": "La funci\u00f3n LZWEncode en tif_lzw.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \"-c lzw\" es utilizada, permite a atacantes remotos provocar una denegaci\u00f3n de servicios (sobre lectura de b\u00fafer) a trav\u00e9s de una imagen BMP manipulada."
}
],
"id": "CVE-2016-3621",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-10-03T16:09:02.897",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201701-16"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
suse-su-2018:3879-1
Vulnerability from csaf_suse
Published
2018-11-23 16:06
Modified
2018-11-23 16:06
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
Security issues fixed:
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322).
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).
Non-security issues fixed:
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
Patchnames
sdksp4-tiff-13878,slessp4-tiff-13878
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).\n- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).\n- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). \n- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).\n- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).\n- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).\n- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).\n- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).\n- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)\n- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)\n- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).\n\nNon-security issues fixed:\n\n- asan_build: build ASAN included\n- debug_build: build more suitable for debugging\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-tiff-13878,slessp4-tiff-13878",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3879-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3879-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183879-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3879-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010163",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "self",
"summary": "SUSE Bug 1014461",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "self",
"summary": "SUSE Bug 1040080",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "self",
"summary": "SUSE Bug 1040322",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "self",
"summary": "SUSE Bug 1074186",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "self",
"summary": "SUSE Bug 1099257",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "self",
"summary": "SUSE Bug 1113672",
"url": "https://bugzilla.suse.com/1113672"
},
{
"category": "self",
"summary": "SUSE Bug 974446",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "self",
"summary": "SUSE Bug 974447",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "self",
"summary": "SUSE Bug 974448",
"url": "https://bugzilla.suse.com/974448"
},
{
"category": "self",
"summary": "SUSE Bug 983440",
"url": "https://bugzilla.suse.com/983440"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8870 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5319 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9273 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9273/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17942 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9117 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9147 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12900 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18661 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18661/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2018-11-23T16:06:18Z",
"generator": {
"date": "2018-11-23T16:06:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3879-1",
"initial_release_date": "2018-11-23T16:06:18Z",
"revision_history": [
{
"date": "2018-11-23T16:06:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product_id": "libtiff3-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.i586",
"product": {
"name": "tiff-3.8.2-141.169.22.1.i586",
"product_id": "tiff-3.8.2-141.169.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-x86-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product_id": "tiff-3.8.2-141.169.22.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product_id": "tiff-3.8.2-141.169.22.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product": {
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product_id": "tiff-3.8.2-141.169.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product_id": "tiff-3.8.2-141.169.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-8870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8870"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8870",
"url": "https://www.suse.com/security/cve/CVE-2015-8870"
},
{
"category": "external",
"summary": "SUSE Bug 1014461 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2015-8870"
},
{
"cve": "CVE-2016-3619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3619"
}
],
"notes": [
{
"category": "general",
"text": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3619",
"url": "https://www.suse.com/security/cve/CVE-2016-3619"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974446 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3619"
},
{
"cve": "CVE-2016-3620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3620"
}
],
"notes": [
{
"category": "general",
"text": "The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c zip\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3620",
"url": "https://www.suse.com/security/cve/CVE-2016-3620"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/974447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3620"
},
{
"cve": "CVE-2016-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3621"
}
],
"notes": [
{
"category": "general",
"text": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3621",
"url": "https://www.suse.com/security/cve/CVE-2016-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3621"
},
{
"cve": "CVE-2016-5319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5319"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5319",
"url": "https://www.suse.com/security/cve/CVE-2016-5319"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-5319"
},
{
"cve": "CVE-2016-9273",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9273"
}
],
"notes": [
{
"category": "general",
"text": "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9273",
"url": "https://www.suse.com/security/cve/CVE-2016-9273"
},
{
"category": "external",
"summary": "SUSE Bug 1010163 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "external",
"summary": "SUSE Bug 1017693 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1017693"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-9273"
},
{
"cve": "CVE-2017-17942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17942"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17942",
"url": "https://www.suse.com/security/cve/CVE-2017-17942"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-17942"
},
{
"cve": "CVE-2017-9117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9117"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9117",
"url": "https://www.suse.com/security/cve/CVE-2017-9117"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9117"
},
{
"cve": "CVE-2017-9147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9147"
}
],
"notes": [
{
"category": "general",
"text": "LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9147",
"url": "https://www.suse.com/security/cve/CVE-2017-9147"
},
{
"category": "external",
"summary": "SUSE Bug 1040322 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9147"
},
{
"cve": "CVE-2018-12900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12900"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12900",
"url": "https://www.suse.com/security/cve/CVE-2018-12900"
},
{
"category": "external",
"summary": "SUSE Bug 1099257 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "external",
"summary": "SUSE Bug 1125113 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1125113"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-12900"
},
{
"cve": "CVE-2018-18661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18661"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18661",
"url": "https://www.suse.com/security/cve/CVE-2018-18661"
},
{
"category": "external",
"summary": "SUSE Bug 1113672 for CVE-2018-18661",
"url": "https://bugzilla.suse.com/1113672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2018-18661"
}
]
}
cnvd-2016-02091
Vulnerability from cnvd
Title
Silicon Graphics LibTiff bmp2tiff工具拒绝服务漏洞(CNVD-2016-02091)
Description
Silicon Graphics LibTiff是一个读写TIFF文件的库。该库包含一些处理TIFF文件的命令行工具。
Silicon Graphics LibTiff的bmp2tiff工具中的tif_lzw.c文件中的‘LZWEncode’函数存在拒绝服务漏洞,允许攻击者利用带有‘-c lzw’参数的bmp图像,诱使应用解析,使应用程序崩溃。
Severity
中
VLAI Severity ?
Patch Name
Silicon Graphics LibTiff bmp2tiff工具拒绝服务漏洞(CNVD-2016-02091)的补丁
Patch Description
Silicon Graphics LibTiff是一个读写TIFF文件的库。该库包含一些处理TIFF文件的命令行工具。
Silicon Graphics LibTiff的bmp2tiff工具中的tif_lzw.c文件中的‘LZWEncode’函数存在拒绝服务漏洞,允许攻击者利用带有‘-c lzw’参数的bmp图像,诱使应用解析,使应用程序崩溃。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://www.libtiff.org/
Reference
http://www.openwall.com/lists/oss-security/2016/04/07/3
Impacted products
| Name | Silicon Graphics, Inc. LibTiff <=4.0.6 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-3621"
}
},
"description": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684tif_lzw.c\u6587\u4ef6\u4e2d\u7684\u2018LZWEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "Mei Wang of the Cloud Security Team, Qihoo 360",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.libtiff.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-02091",
"openTime": "2016-04-11",
"patchDescription": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684tif_lzw.c\u6587\u4ef6\u4e2d\u7684\u2018LZWEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-02091\uff09\u7684\u8865\u4e01",
"products": {
"product": "Silicon Graphics, Inc. LibTiff \u003c=4.0.6"
},
"referenceLink": "http://www.openwall.com/lists/oss-security/2016/04/07/3",
"serverity": "\u4e2d",
"submitTime": "2016-04-09",
"title": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-02091\uff09"
}
CERTFR-2020-AVI-420
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Junos Space et Junos Space Security Director versions antérieures à 20.1R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space et Junos Space Security Director versions ant\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2016-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2324"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2012-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4447"
},
{
"name": "CVE-2016-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3991"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2014-7826",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7826"
},
{
"name": "CVE-2020-1648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1648"
},
{
"name": "CVE-2016-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3621"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2016-6662",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6662"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2009-2347",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2347"
},
{
"name": "CVE-2014-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3634"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2015-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1782"
},
{
"name": "CVE-2017-13098",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13098"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2014-7825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7825"
},
{
"name": "CVE-2016-6136",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6136"
},
{
"name": "CVE-2020-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1646"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2088"
},
{
"name": "CVE-2014-9938",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9938"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2020-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1651"
},
{
"name": "CVE-2010-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2067"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2016-3945",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3945"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2020-1645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1645"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2020-1640",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1640"
},
{
"name": "CVE-2013-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4244"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1643"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2015-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7940"
},
{
"name": "CVE-2017-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000117"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2014-3690",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3690"
},
{
"name": "CVE-2018-1000613",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000613"
},
{
"name": "CVE-2017-12588",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12588"
},
{
"name": "CVE-2016-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0787"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-9555",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9555"
},
{
"name": "CVE-2013-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1624"
},
{
"name": "CVE-2016-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3990"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2018-1000021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000021"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2014-9679",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9679"
},
{
"name": "CVE-2020-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1647"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2020-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1652"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2009-5022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5022"
},
{
"name": "CVE-2016-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1835"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2020-1650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1650"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2017-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9935"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5382"
},
{
"name": "CVE-2014-9584",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9584"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2016-5616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5616"
},
{
"name": "CVE-2015-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1421"
},
{
"name": "CVE-2014-9529",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9529"
},
{
"name": "CVE-2020-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1654"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2015-7082",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7082"
},
{
"name": "CVE-2006-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2193"
},
{
"name": "CVE-2014-8171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8171"
},
{
"name": "CVE-2006-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2656"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2018-11233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11233"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4243"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2011-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3200"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2017-15298",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15298"
},
{
"name": "CVE-2014-8884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8884"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2020-1641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1641"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2013-4758",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4758"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2016-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5314"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2010-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2065"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2010-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1411"
},
{
"name": "CVE-2016-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3632"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2020-1649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1649"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2012-2113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2113"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2014-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3215"
},
{
"name": "CVE-2018-11235",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11235"
},
{
"name": "CVE-2016-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6663"
},
{
"name": "CVE-2018-19486",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19486"
},
{
"name": "CVE-2015-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7545"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2018-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5360"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2020-1644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1644"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
},
{
"name": "CVE-2012-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3401"
},
{
"name": "CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"name": "CVE-2014-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3683"
}
],
"initial_release_date": "2020-07-09T00:00:00",
"last_revision_date": "2020-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11038 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11038\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11024 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11024\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11026 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11027 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11027\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11035 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11035\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11023 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11025 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11025\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11034 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11034\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11033 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11033\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11032 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11032\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11036 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11036\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11031 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11031\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11030 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11030\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11037 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11037\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11028 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11028\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
ghsa-h34f-8p6m-3w66
Vulnerability from github
Published
2022-05-17 01:18
Modified
2022-05-17 01:18
Severity ?
VLAI Severity ?
Details
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
{
"affected": [],
"aliases": [
"CVE-2016-3621"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-10-03T16:09:00Z",
"severity": "HIGH"
},
"details": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GHSA-h34f-8p6m-3w66",
"modified": "2022-05-17T01:18:13Z",
"published": "2022-05-17T01:18:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3621"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"type": "WEB",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1035508"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2016-3621
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-3621",
"description": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3621",
"references": [
"https://www.suse.com/security/cve/CVE-2016-3621.html",
"https://security.archlinux.org/CVE-2016-3621"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-3621"
],
"details": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3621",
"modified": "2023-12-13T01:21:27.302978Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2565",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0.6",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3621"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2565",
"refsource": "MISC",
"tags": [
"Issue Tracking"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2565"
},
{
"name": "[oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/3"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "1035508",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1035508"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2017-09-03T01:29Z",
"publishedDate": "2016-10-03T16:09Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…