Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17095

Опубликовано: 29 нояб. 2017
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.

Отчет

This vulnerability is rated as moderate because it allows a remote attacker to trigger a denial of service through a heap-based buffer overflow, exploiting this flaw would crash the application, affecting availability without compromising system integrity. This vulnerability affects the pal2rgb executable which is part of the tools distributed with libtiff upstream, but shipped in libtiff-tools RPM package instead of libtiff package on Red Hat Enterprise Linux distribution. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libtiffOut of support scope
Red Hat Enterprise Linux 6libtiffOut of support scope
Red Hat Enterprise Linux 7compat-libtiff3Out of support scope
Red Hat Enterprise Linux 7libtiffOut of support scope
Red Hat Enterprise Linux 9libtiffAffected
Red Hat Enterprise Linux 8libtiffFixedRHSA-2025:465807.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1524284libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service

EPSS

Процентиль: 83%
0.01914
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.

CVSS3: 8.8
nvd
больше 7 лет назад

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.

CVSS3: 8.8
debian
больше 7 лет назад

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to ...

rocky
10 дней назад

Moderate: libtiff security update

CVSS3: 8.8
github
около 3 лет назад

tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.

EPSS

Процентиль: 83%
0.01914
Низкий

7.5 High

CVSS3