Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7593

Опубликовано: 09 апр. 2017
Источник: debian

Описание

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tifffixed4.0.7-6package
tiff3removedpackage

Примечания

  • http://bugzilla.maptools.org/show_bug.cgi?id=2651

  • https://github.com/vadz/libtiff/commit/d60332057b9575ada4f264489582b13e30137be1

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 4.4
redhat
около 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 5.5
nvd
почти 9 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

CVSS3: 5.5
github
больше 3 лет назад

tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.

suse-cvrf
больше 8 лет назад

Security update for tiff