Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-1916

Published: 10 April 2023

A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.

Notes

AuthorNote
mdeslaur
low security impact as it is a denial of service in a command-
line tool only, marking as low priority
ccdm94
As of 2023-08-22, the fix for this issue seems to have not been
merged (https://gitlab.com/libtiff/libtiff/-/merge_requests/476).
mdeslaur
There is a new merge request here: https://gitlab.com/libtiff/libtiff/-/merge_requests/535
Since the tiffcrop tool has been removed, the merge request will
go nowhere, but can likely be used to fix previous releases.

Priority

Low

Cvss 3 Severity Score

6.1

Score breakdown

Status

Package Release Status
tiff
Launchpad, Ubuntu, Debian
bionic
Released (4.0.9-5ubuntu0.10+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (4.1.0+git191117-2ubuntu0.20.04.10)
jammy
Released (4.3.0-6ubuntu0.6)
kinetic Ignored
(end of life, was deferred [2023-08-22])
lunar
Released (4.5.0-5ubuntu1.2)
mantic Needed

noble Pending
(4.5.1+git230720-4ubuntu1)
trusty
Released (4.0.3-7ubuntu0.11+esm10)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needed

xenial
Released (4.0.6-1ubuntu0.8+esm13)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://gitlab.com/libtiff/libtiff/-/commit/848434a81c443f59ec90d41218eba6e48a450a11

Severity score breakdown

Parameter Value
Base score 6.1
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H