Описание
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 4.0.8-5 |
| devel | not-affected | 4.0.9-4 |
| esm-infra-legacy/trusty | released | 4.0.3-7ubuntu0.8 |
| esm-infra/xenial | released | 4.0.6-1ubuntu0.3 |
| precise | ignored | end of life |
| precise/esm | ignored | |
| trusty | released | 4.0.3-7ubuntu0.8 |
| trusty/esm | released | 4.0.3-7ubuntu0.8 |
| upstream | released | 4.0.7-6 |
| vivid/stable-phone-overlay | ignored | end of life |
Показывать по
EPSS
4.3 Medium
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is proper ...
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
EPSS
4.3 Medium
CVSS2
5.5 Medium
CVSS3