Risk | High |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2022-48281 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966 CVE-2023-2731 CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-38288 CVE-2023-38289 |
CWE-ID | CWE-122 CWE-119 CWE-476 CWE-120 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system libtiff5 (Ubuntu package) Operating systems & Components / Operating system package or component libtiff6 (Ubuntu package) Operating systems & Components / Operating system package or component libtiff-tools (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU71620
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-48281
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the processCropSelections() function in tools/tiffcrop.c in LibTIFF. A remote attacker can pass a specially crafted TIFF image to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78285
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25433
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing TIFF images within the rotateImage() function in /libtiff/tools/tiffcrop.c. A remote attacker can pass a specially crafted image to the application, trigger memory corruption and perform a denial of service (DoS) attack.
Update the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78286
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-26965
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the loadImage() function in tools/tiffcrop.c. A remote attacker can pass specially crafted TIFF file to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78287
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-26966
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the uv_encode() function. A remote attacker can pass a specially crafted TIFF file to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79568
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2731
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the LZWDecode() function in the libtiff/tif_lzw.c. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78786
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in tif_dir.c. A remote attacker can pass a specially crafted TIFF file to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78288
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3316
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the TIFFClose() function. A remote attacker can pass specially TIFf file to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79327
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3618
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to buffer overflow in the Fax3Encode() function in libtiff/tif_fax3.c. A remote unauthenticated attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79581
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-38288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the readSeparateTilesIntoBuffer() function in tools/tiffcp.c. A remote attacker can pass specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79583
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-38289
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in tools/raw2tiff.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 23.04
libtiff5 (Ubuntu package): before Ubuntu Pro (Infra-only)
libtiff6 (Ubuntu package): before 4.5.0-5ubuntu1.1
libtiff-tools (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-6290-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.