Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-5225 |
CWE-ID | CWE-122 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
tiff (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU5919
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-5225
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in "tools/tiffcp.cwhen" processing images. A remote attacker can create an image with specially crafted BitsPerSample value, trigger heap-based buffer overflow and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstiff (Alpine package): 4.0.1-r0 - 4.0.7-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=ea14bc786962a30f943aea7ceceb4804f7b5ec9a
https://git.alpinelinux.org/aports/commit/?id=ca4e26abdf0af7b8d12c52909a22ba4855bfc304
https://git.alpinelinux.org/aports/commit/?id=0c504ed6ce49ffab8f4090a5a3ddaeeda27ecbf5
https://git.alpinelinux.org/aports/commit/?id=e5c608366778f367c59fcbb9cfa26af0fd991bc9
https://git.alpinelinux.org/aports/commit/?id=6fc5e083a79961213cb7151c39372e5dee115a45
https://git.alpinelinux.org/aports/commit/?id=b782af4d8b8c365ef6b066128f905e5ba580cc5b
https://git.alpinelinux.org/aports/commit/?id=f27c940eb7d081d6b511176fe4e0a8c1b131a2de
https://git.alpinelinux.org/aports/commit/?id=ff2e7d109f90f775c735acb314bf37b0008f428c
https://git.alpinelinux.org/aports/commit/?id=09b187444459efedfd8a766c4883fcd6867d203d
https://git.alpinelinux.org/aports/commit/?id=a07d9f929286a0f3ccf9ea20f55c62b03f91c4c4
https://git.alpinelinux.org/aports/commit/?id=5bb012e37bf60bec80128ff50650ad4353f24e18
https://git.alpinelinux.org/aports/commit/?id=66709766026c437c20e5b34a781839f7c24494b6
https://git.alpinelinux.org/aports/commit/?id=b25bdff84bd42e9c012c562afe3a312e433a3420
https://git.alpinelinux.org/aports/commit/?id=11139bb70638967120dbd2ef70935b0fbb96052e
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.