8.8
CVSSv3

CVE-2017-17095

Published: 02/12/2017 Updated: 01/12/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote malicious users to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff 4.0.9

Vendor Advisories

LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file ...
Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed For the stable distribution (stretch), these problems have been fixed in version 408-2+deb9u4 We recommend that you upgrade your tiff package ...
Debian Bug report logs - #891288 tiff: CVE-2018-7456: null pointer dereference Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 24 Feb 2018 09:27:02 UTC Severity: important Tags: fixed-upstream, security, upstream ...
Debian Bug report logs - #883320 tiff: CVE-2017-17095: heap-based buffer overflow in pal2rgb tool Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 2 Dec 2017 11:00:02 UTC Severity: normal Tags: security, upstream ...
Debian Bug report logs - #909037 tiff: CVE-2018-17101: Out-of-bounds Write in the tiff2bw and pal2rgb tools Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 17 Sep 2018 18:51:07 UTC Severity: grave Tags: patch, se ...
Debian Bug report logs - #909038 tiff: CVE-2018-17100: potential int32 overflow in multiply_ms() function Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 17 Sep 2018 18:57:01 UTC Severity: grave Tags: patch, secu ...
Debian Bug report logs - #911635 tiff: CVE-2018-18557: JBIG: fix potential out-of-bounds write in JBIGDecode() Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 22 Oct 2018 20:27:01 UTC Severity: grave Tags: patch, ...
Debian Bug report logs - #869823 tiff: CVE-2017-11613 Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 26 Jul 2017 19:39:01 UTC Severity: grave Tags: fixed-upstream, security, upstream Found in versions tiff/40 ...
tools/pal2rgbc in pal2rgb in LibTIFF 409 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file ...

Exploits

Source: bugzillamaptoolsorg/show_bugcgi?id=2750 The vulnerability is triggered by /tools/pal2rgb $FILE /dev/null The asan debug information is below: TIFFFetchNormalTag: Warning, IO error during reading of "XResolution"; tag ignored TIFFFetchNormalTag: Warning, IO error during reading of "YResolution"; tag ignored sampletiff: JPEG ...