Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-6277

Published: 24 November 2023

An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.

Notes

AuthorNote
Priority reason:
Minor issue, only a OOM DoS
rodrigo-zaiden
the first commit was claimed to introduce regressions, so
we should consider the follow up commits that makes the check a bit less
restrictive.
one of the regressions was caught by debian in libimager-perl,
https://bugs.debian.org/1057270. with the proposed follow up commits, we
should be clear wit that regression

Priority

Low

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
tiff
Launchpad, Ubuntu, Debian
bionic
Released (4.0.9-5ubuntu0.10+esm5)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (4.1.0+git191117-2ubuntu0.20.04.12)
jammy
Released (4.3.0-6ubuntu0.8)
lunar Ignored
(end of life, was needed)
mantic
Released (4.5.1+git230720-1ubuntu1.1)
trusty
Released (4.0.3-7ubuntu0.11+esm12)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (4.5.1+git230720-2)
xenial
Released (4.0.6-1ubuntu0.8+esm15)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://gitlab.com/libtiff/libtiff/-/commit/5320c9d89c054fa805d037d84c57da874470b01a
upstream: https://gitlab.com/libtiff/libtiff/-/commit/0b025324711213a75e38b52f7e7ba60235f108aa
upstream: https://gitlab.com/libtiff/libtiff/-/commit/de7bfd7d4377c266f81849579f696fa1ad5ba6c3
upstream: https://gitlab.com/libtiff/libtiff/-/commit/dbb825a8312f30e63a06c272010967d51af5c35a

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H