Vulnerability identifier: #VU1067
Vulnerability risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-843
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
LibTIFF
Universal components / Libraries /
Libraries used by multiple products
Vendor: LibTIFF
Description
The vulnerability allows a remote unauthenticated user to execute arbitrary code execution om the target system.
The weakness exists due to improper handling of compressed, TIFF images. By convincing the victim to open a file with specially crafted TIFF images, attackers can trigger a type confusion condition and execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution.
Mitigation
Securitylab is temporaly unaware of the patches resolving the vulnerability.
Vulnerable software versions
LibTIFF: 4.0.6
External links
https://www.talosintelligence.com/reports/TALOS-2016-0190/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.