Risk | High |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2020-18768 CVE-2023-25433 CVE-2023-26966 CVE-2023-2908 CVE-2023-3316 CVE-2023-3576 CVE-2023-3618 CVE-2023-38288 CVE-2023-38289 |
CWE-ID | CWE-122 CWE-119 CWE-476 CWE-401 CWE-120 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system openSUSE Leap Micro Operating systems & Components / Operating system SUSE Package Hub 15 Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Micro for Rancher Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system tiff Operating systems & Components / Operating system package or component libtiff-devel Operating systems & Components / Operating system package or component libtiff-devel-32bit Operating systems & Components / Operating system package or component libtiff5-32bit Operating systems & Components / Operating system package or component libtiff5-32bit-debuginfo Operating systems & Components / Operating system package or component tiff-debugsource Operating systems & Components / Operating system package or component libtiff5 Operating systems & Components / Operating system package or component tiff-debuginfo Operating systems & Components / Operating system package or component libtiff5-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU82762
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-18768
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the _TIFFmemcpy() function in tif_unix.c. A remote attacker can pass specially crafted image to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack.
Update the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78285
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-25433
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing TIFF images within the rotateImage() function in /libtiff/tools/tiffcrop.c. A remote attacker can pass a specially crafted image to the application, trigger memory corruption and perform a denial of service (DoS) attack.
Update the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78287
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-26966
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the uv_encode() function. A remote attacker can pass a specially crafted TIFF file to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78786
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in tif_dir.c. A remote attacker can pass a specially crafted TIFF file to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78288
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3316
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the TIFFClose() function. A remote attacker can pass specially TIFf file to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78727
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3576
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in tools/tiffcrop.c when handling TIFF files. A remote attacker can force the application to leak memory and perform denial of service attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79327
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3618
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to buffer overflow in the Fax3Encode() function in libtiff/tif_fax3.c. A remote unauthenticated attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79581
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-38288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the readSeparateTilesIntoBuffer() function in tools/tiffcp.c. A remote attacker can pass specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79583
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-38289
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in tools/raw2tiff.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.2 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
SUSE Package Hub 15: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.2 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
tiff: before 4.0.9-150000.45.32.1
libtiff-devel: before 4.0.9-150000.45.32.1
libtiff-devel-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit: before 4.0.9-150000.45.32.1
libtiff5-32bit-debuginfo: before 4.0.9-150000.45.32.1
tiff-debugsource: before 4.0.9-150000.45.32.1
libtiff5: before 4.0.9-150000.45.32.1
tiff-debuginfo: before 4.0.9-150000.45.32.1
libtiff5-debuginfo: before 4.0.9-150000.45.32.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.