suse-su-2018:1889-1
Vulnerability from csaf_suse
Published
2018-07-05 06:41
Modified
2018-07-05 06:41
Summary
Security update for tiff

Notes

Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following security issues: These security issues were fixed: - CVE-2017-18013: Fixed a NULL pointer dereference in the tif_print.cTIFFPrintDirectory function that could have lead to denial of service (bsc#1074317). - CVE-2018-10963: Fixed an assertion failure in the TIFFWriteDirectorySec() function in tif_dirwrite.c, which allowed remote attackers to cause a denial of service via a crafted file (bsc#1092949). - CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825). - CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332). - CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408).
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1279,SUSE-SLE-Module-Desktop-Applications-15-2018-1279
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for tiff",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for tiff fixes the following security issues:\n\nThese security issues were fixed:\n\n- CVE-2017-18013: Fixed a NULL pointer dereference in the\n  tif_print.cTIFFPrintDirectory function that could have lead to denial of\n  service (bsc#1074317).\n- CVE-2018-10963: Fixed an assertion failure in the TIFFWriteDirectorySec()\n  function in tif_dirwrite.c, which allowed remote attackers to cause a denial\n  of service via a crafted file (bsc#1092949).\n- CVE-2018-7456: Prevent a NULL Pointer dereference in the function\n  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF\n  information, a different vulnerability than CVE-2017-18013 (bsc#1082825).\n- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During\n  the TIFFOpen process, td_imagelength is not checked. The value of\n  td_imagelength can be directly controlled by an input file. In the\n  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called\n  based on td_imagelength. If the value of td_imagelength is set close to the\n  amount of system memory, it will hang the system or trigger the OOM killer\n  (bsc#1082332).\n- CVE-2018-8905: Prevent heap-based buffer overflow in the function\n  LZWDecodeCompat via a crafted TIFF file (bsc#1086408).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Module-Basesystem-15-2018-1279,SUSE-SLE-Module-Desktop-Applications-15-2018-1279",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1889-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2018:1889-1",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181889-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2018:1889-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074317",
        "url": "https://bugzilla.suse.com/1074317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1082332",
        "url": "https://bugzilla.suse.com/1082332"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1082825",
        "url": "https://bugzilla.suse.com/1082825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086408",
        "url": "https://bugzilla.suse.com/1086408"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1092949",
        "url": "https://bugzilla.suse.com/1092949"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-11613 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-11613/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-18013 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-18013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-10963 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-10963/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-7456 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-7456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8905 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8905/"
      }
    ],
    "title": "Security update for tiff",
    "tracking": {
      "current_release_date": "2018-07-05T06:41:28Z",
      "generator": {
        "date": "2018-07-05T06:41:28Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2018:1889-1",
      "initial_release_date": "2018-07-05T06:41:28Z",
      "revision_history": [
        {
          "date": "2018-07-05T06:41:28Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-devel-4.0.9-5.9.1.aarch64",
                "product": {
                  "name": "libtiff-devel-4.0.9-5.9.1.aarch64",
                  "product_id": "libtiff-devel-4.0.9-5.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libtiff5-4.0.9-5.9.1.aarch64",
                "product": {
                  "name": "libtiff5-4.0.9-5.9.1.aarch64",
                  "product_id": "libtiff5-4.0.9-5.9.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-devel-4.0.9-5.9.1.ppc64le",
                "product": {
                  "name": "libtiff-devel-4.0.9-5.9.1.ppc64le",
                  "product_id": "libtiff-devel-4.0.9-5.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libtiff5-4.0.9-5.9.1.ppc64le",
                "product": {
                  "name": "libtiff5-4.0.9-5.9.1.ppc64le",
                  "product_id": "libtiff5-4.0.9-5.9.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-devel-4.0.9-5.9.1.s390x",
                "product": {
                  "name": "libtiff-devel-4.0.9-5.9.1.s390x",
                  "product_id": "libtiff-devel-4.0.9-5.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libtiff5-4.0.9-5.9.1.s390x",
                "product": {
                  "name": "libtiff5-4.0.9-5.9.1.s390x",
                  "product_id": "libtiff5-4.0.9-5.9.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-devel-4.0.9-5.9.1.x86_64",
                "product": {
                  "name": "libtiff-devel-4.0.9-5.9.1.x86_64",
                  "product_id": "libtiff-devel-4.0.9-5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libtiff5-4.0.9-5.9.1.x86_64",
                "product": {
                  "name": "libtiff5-4.0.9-5.9.1.x86_64",
                  "product_id": "libtiff5-4.0.9-5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libtiff5-32bit-4.0.9-5.9.1.x86_64",
                "product": {
                  "name": "libtiff5-32bit-4.0.9-5.9.1.x86_64",
                  "product_id": "libtiff5-32bit-4.0.9-5.9.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Desktop Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Desktop Applications 15",
                  "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-desktop-applications:15"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-4.0.9-5.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64"
        },
        "product_reference": "libtiff-devel-4.0.9-5.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-4.0.9-5.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le"
        },
        "product_reference": "libtiff-devel-4.0.9-5.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-4.0.9-5.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x"
        },
        "product_reference": "libtiff-devel-4.0.9-5.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-4.0.9-5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64"
        },
        "product_reference": "libtiff-devel-4.0.9-5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff5-4.0.9-5.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64"
        },
        "product_reference": "libtiff5-4.0.9-5.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff5-4.0.9-5.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le"
        },
        "product_reference": "libtiff5-4.0.9-5.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff5-4.0.9-5.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x"
        },
        "product_reference": "libtiff5-4.0.9-5.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff5-4.0.9-5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64"
        },
        "product_reference": "libtiff5-4.0.9-5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff5-32bit-4.0.9-5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
          "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        },
        "product_reference": "libtiff5-32bit-4.0.9-5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-11613",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-11613"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-11613",
          "url": "https://www.suse.com/security/cve/CVE-2017-11613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1082332 for CVE-2017-11613",
          "url": "https://bugzilla.suse.com/1082332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1106853 for CVE-2017-11613",
          "url": "https://bugzilla.suse.com/1106853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-07-05T06:41:28Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-11613"
    },
    {
      "cve": "CVE-2017-18013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-18013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-18013",
          "url": "https://www.suse.com/security/cve/CVE-2017-18013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074317 for CVE-2017-18013",
          "url": "https://bugzilla.suse.com/1074317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1082825 for CVE-2017-18013",
          "url": "https://bugzilla.suse.com/1082825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-07-05T06:41:28Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-18013"
    },
    {
      "cve": "CVE-2018-10963",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-10963"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-10963",
          "url": "https://www.suse.com/security/cve/CVE-2018-10963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092949 for CVE-2018-10963",
          "url": "https://bugzilla.suse.com/1092949"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-07-05T06:41:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-10963"
    },
    {
      "cve": "CVE-2018-7456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-7456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-7456",
          "url": "https://www.suse.com/security/cve/CVE-2018-7456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074317 for CVE-2018-7456",
          "url": "https://bugzilla.suse.com/1074317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1082825 for CVE-2018-7456",
          "url": "https://bugzilla.suse.com/1082825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-07-05T06:41:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-7456"
    },
    {
      "cve": "CVE-2018-8905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8905",
          "url": "https://www.suse.com/security/cve/CVE-2018-8905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1086408 for CVE-2018-8905",
          "url": "https://bugzilla.suse.com/1086408"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff-devel-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15:libtiff5-4.0.9-5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Desktop Applications 15:libtiff5-32bit-4.0.9-5.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-07-05T06:41:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8905"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…