8.8
CVSSv3

CVE-2016-5314

Published: 12/03/2018 Updated: 05/04/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 607
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and previous versions allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff

opensuse opensuse 13.2

opensuse opensuse 13.1

opensuse leap 42.1

redhat enterprise linux 7.0

redhat enterprise linux 6.0

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file ...
Multiple vulnerabilities have been discovered in the libtiff library and the included tools tiff2rgba, rgb2ycbcr, tiffcp, tiffcrop, tiff2pdf and tiffsplit, which may result in denial of service, memory disclosure or the execution of arbitrary code There were additional vulnerabilities in the tools bmp2tiff, gif2tiff, thumbnail and ras2tiff, but si ...
Buffer overflow in the PixarLogDecode function in tif_pixarlogc in LibTIFF 406 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr ...
Debian Bug report logs - #830700 CVE-2016-5314: tiff: PixarLogDecode() heap-based buffer overflow Package: tiff; Maintainer for tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Henri Salo <henri@nervfi> Date: Sun, 10 Jul 2016 14:57:02 UTC Severity: grave Tags: fixed-upstream, security, upstream Found ...
Debian Bug report logs - #820362 tiff: CVE-2016-3619: Memory corruption in DumpModeEncode triggered by crafted bmp file Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 7 Apr 2016 18:51:02 UTC Severity: important ...
Debian Bug report logs - #842361 CVE-2016-5652: heap based buffer overflow in tiff2pdf Package: tiff; Maintainer for tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Raphael Hertzog <hertzog@debianorg> Date: Fri, 28 Oct 2016 12:42:05 UTC Severity: important Tags: fixed-upstream, patch, security, upstr ...
Debian Bug report logs - #820363 tiff: CVE-2016-3620: Out-of-bound read in ZIPEncode Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 7 Apr 2016 18:51:06 UTC Severity: important Tags: security, upstream Found in ...
Debian Bug report logs - #819972 tiff: CVE-2016-3186: buffer overflow in gif2tiff Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 4 Apr 2016 12:51:02 UTC Severity: important Tags: security, upstream, wontfix Fo ...
Debian Bug report logs - #842046 Multiple CVE: Remove tools dropped by upstream Package: tiff; Maintainer for tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Raphael Hertzog <hertzog@debianorg> Date: Tue, 25 Oct 2016 14:00:02 UTC Severity: important Tags: security Found in version 402-6 Fixed in v ...
Debian Bug report logs - #842270 CVE-2016-6223: information leak in libtiff/tif_readc Package: tiff; Maintainer for tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Raphael Hertzog <hertzog@debianorg> Date: Thu, 27 Oct 2016 14:30:01 UTC Severity: important Tags: fixed-upstream, patch, security, upstr ...
Debian Bug report logs - #820364 tiff: CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 7 Apr 2016 18:51:11 UTC Severity: important Tags: security, upstream ...
Debian Bug report logs - #820366 tiff: CVE-2016-3631: Illegal read in the cpStrips and cpTiles function Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 7 Apr 2016 18:54:02 UTC Severity: important Tags: fixed-ups ...
A vulnerability was found in libtiff A maliciously crafted TIFF file could cause the application to crash when using rgb2ycbcr command via an out-of-bounds write in the PixarLogDecode() function ...

Github Repositories

VulnLoc Overview Automatic vulnerability diagnosis can help security analysts identify and, therefore, quickly patch disclosed vulnerabilities The vulnerability localization problem is to automatically find a program point at which the “root cause” of the bug can be fixed This paper employs a statistical localization approach to analyze a given exploit Our main t

VulnLoc Overview Automatic vulnerability diagnosis can help security analysts identify and, therefore, quickly patch disclosed vulnerabilities The vulnerability localization problem is to automatically find a program point at which the “root cause” of the bug can be fixed This paper employs a statistical localization approach to analyze a given exploit Our main t

VulnLoc Overview Automatic vulnerability diagnosis can help security analysts identify and, therefore, quickly patch disclosed vulnerabilities The vulnerability localization problem is to automatically find a program point at which the “root cause” of the bug can be fixed This paper employs a statistical localization approach to analyze a given exploit Our main t

Overview Automated program repair can significantly reduce the window of exposure after a vulnerability is disclosed In this paper, we study the problem of patch localization to find a program point at which a patch can be synthesized for a previously detected vulnerability Given a vulnerable binary and only one exploit input, our approach can (complete it later) Installa

VulnLoc How to run the new version of VulnLoc The new image (which is auto-built after pushing to Github), is at yuntongzhang/vulnloc:github To run on one example, create a container with this image, and do: cd /opt/fuzzer/code python3 mainpy --config /opt/cve_2016_5314/vulnloc-config --tag cve_2016_5314 --timeout 240 Overview Automatic