Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7593

Опубликовано: 09 апр. 2017
Источник: debian
EPSS Низкий

Описание

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tifffixed4.0.7-6package
tiff3removedpackage

Примечания

  • http://bugzilla.maptools.org/show_bug.cgi?id=2651

  • https://github.com/vadz/libtiff/commit/d60332057b9575ada4f264489582b13e30137be1

EPSS

Процентиль: 58%
0.00361
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 4.4
redhat
больше 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 5.5
nvd
около 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 5.5
github
почти 4 года назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

suse-cvrf
больше 8 лет назад

Security update for tiff

EPSS

Процентиль: 58%
0.00361
Низкий