CVE-2014-8127
Published: 31 December 2014
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
Priority
CVSS 3 base score: 6.5
Notes
Author | Note |
---|---|
mdeslaur | usn-2553-1 didn't actually fix the issue in bug #2500 as no patch was available at the time of publication. A future update will include a patch for the issue. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127
- http://www.conostix.com/pub/adv/CVE-2014-8127-LibTIFF-Out-of-bounds_Reads.txt
- https://ubuntu.com/security/notices/USN-2553-1
- NVD
- Launchpad
- Debian
Bugs
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185
- http://bugzilla.maptools.org/show_bug.cgi?id=2484 (thumbnail)
- http://bugzilla.maptools.org/show_bug.cgi?id=2485 (tiff2bw)
- http://bugzilla.maptools.org/show_bug.cgi?id=2486 (tiff2rgba)
- http://bugzilla.maptools.org/show_bug.cgi?id=2496 (tiff2ps and tiffdither)
- http://bugzilla.maptools.org/show_bug.cgi?id=2497 (tiffmedian)
- http://bugzilla.maptools.org/show_bug.cgi?id=2500 (tiffset) [not fixed yet in CVS HEAD]