#VU32126 Integer overflow in LibTIFF


Published: 2017-04-09 | Updated: 2020-07-28

Vulnerability identifier: #VU32126

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7602

CWE-ID: CWE-190

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
LibTIFF
Universal components / Libraries / Libraries used by multiple products

Vendor: LibTIFF

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.

Mitigation
Install update from vendor's website.

Vulnerable software versions

LibTIFF: 1:6.0p1-4+deb7u4


External links
http://www.debian.org/security/2017/dsa-3844
http://www.securityfocus.com/bid/97500
http://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes
http://security.gentoo.org/glsa/201709-27
http://usn.ubuntu.com/3602-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability