Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2017-7599: tiff: "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Victor Pereira <vpereira> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | mvetter, pgajdos, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/183189/ | ||
Whiteboard: | CVSSv2:NVD:CVE-2017-7599:6.8:(AV:N/AC:M/Au:N/C:P/I:P/A:P) CVSSv3:NVD:CVE-2017-7599:7.8:(AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSSv2:SUSE:CVE-2017-7599:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv3:SUSE:CVE-2017-7599:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSSv3:RedHat:CVE-2017-7599:3.3:(AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) maint:released:sle10-sp3:64045 | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Victor Pereira
2017-04-10 05:57:42 UTC
openSUSE-SU-2017:2635-1: An update that fixes 14 vulnerabilities is now available. Category: security (moderate) Bug References: 1033109,1033111,1033112,1033113,1033118,1033120,1033126,1033127,1033128,1033129,1033131,1038438,1042804,1042805 CVE References: CVE-2016-10371,CVE-2017-7592,CVE-2017-7593,CVE-2017-7594,CVE-2017-7595,CVE-2017-7596,CVE-2017-7597,CVE-2017-7598,CVE-2017-7599,CVE-2017-7600,CVE-2017-7601,CVE-2017-7602,CVE-2017-9403,CVE-2017-9404 Sources used: openSUSE Leap 42.3 (src): tiff-4.0.8-21.1 openSUSE Leap 42.2 (src): tiff-4.0.8-17.6.1 http://bugzilla.maptools.org/show_bug.cgi?id=2646 https://github.com/vadz/libtiff/commit/3144e57770c1e4d26520d8abee750f8ac8b75490 CVE-2017-7596 (bug 1033126), CVE-2017-7597 (bug 1033120), CVE-2017-7599 (bug 1033113) and CVE-2017-7600 (bug 1033112) share the commit. 12/tiff $ tiffcp -i 00117-libtiff-outside-short-tif_dirwrite /tmp/foo TIFFReadDirectoryCheckOrder: Warning, Invalid TIFF directory; tags are not sorted in ascending order. TIFFReadDirectory: Warning, Unknown field with tag 2583 (0xa17) encountered. TIFFFetchNormalTag: Warning, Sanity check on size of "DocumentName" value failed; tag ignored. TIFFFetchNormalTag: Warning, Sanity check on size of "Tag 2583" value failed; tag ignored. TIFFFetchNormalTag: Warning, incorrect count for field "PageNumber", expected 2, got 2. TIFFFetchNormalTag: Warning, Incompatible type for "Software"; tag ignored. TIFFReadDirectory: Warning, TIFF directory is missing required "StripByteCounts" field, calculating from imagelength. TIFFFillStrip: Read error on strip 0; got 18446494488865014140 bytes, expected 2. TIFFWriteDirectoryTagCheckedRational: Not-a-number value is illegal. TIFFWriteDirectoryTagCheckedRational: Not-a-number value is illegal. $ 11/tiff $ tiffcp -i 00117-libtiff-outside-short-tif_dirwrite /tmp/foo 00117-libtiff-outside-short-tif_dirwrite: This is a BigTIFF file. This format not supported by this version of libtiff.. $ [testcase does not work] PATCH see comment 2 12/ImageMagick: has it in via version update 11/ImageMagick: considering affected by this CVE set AFTER 11/ImageMagick $ tiffcp -i 00117-libtiff-outside-short-tif_dirwrite /tmp/foo 00117-libtiff-outside-short-tif_dirwrite: This is a BigTIFF file. This format not supported by this version of libtiff.. $ Will submit for 11/tiff and 10sp3/tiff. Packages submitted: 12/tiff: 165341 11/tiff: 165349 10sp3/tiff: 165350 @Michael, after you review these requests and after you accept and resubmit packages in case everything's ok, I think you can reassign this bug to security-team@. Thanks a lot Petr! All perfect. SR#165480 to SLE12. SR#165482 to SLE11. SR#165483 to SLE10. An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2018-06-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/64044 SUSE-SU-2018:1472-1: An update that solves 14 vulnerabilities and has two fixes is now available. Category: security (moderate) Bug References: 1017694,1031250,1031254,1033109,1033111,1033112,1033113,1033120,1033126,1033127,1033129,1074317,984808,984809,984831,987351 CVE References: CVE-2016-10267,CVE-2016-10269,CVE-2016-10270,CVE-2016-5314,CVE-2016-5315,CVE-2017-18013,CVE-2017-7593,CVE-2017-7595,CVE-2017-7596,CVE-2017-7597,CVE-2017-7599,CVE-2017-7600,CVE-2017-7601,CVE-2017-7602 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): tiff-3.8.2-141.169.6.1 SUSE Linux Enterprise Server 11-SP4 (src): tiff-3.8.2-141.169.6.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): tiff-3.8.2-141.169.6.1 done |