Описание
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | uses system tiff |
esm-apps/bionic | not-affected | uses system tiff |
esm-apps/focal | not-affected | uses system tiff |
esm-apps/jammy | not-affected | uses system tiff |
esm-apps/noble | not-affected | uses system tiff |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | needs-triage | |
jammy | not-affected | uses system tiff |
noble | not-affected | uses system tiff |
plucky | not-affected | uses system tiff |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | dropped embedded libtiff |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | not-affected | dropped embedded libtiff |
jammy | needs-triage | |
noble | not-affected | dropped embedded libtiff |
plucky | not-affected | dropped embedded libtiff |
questing | not-affected | dropped embedded libtiff |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
jammy | needs-triage | |
noble | needs-triage | |
plucky | needs-triage | |
questing | needs-triage | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
jammy | needs-triage | |
noble | needs-triage | |
plucky | needs-triage | |
questing | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 4.7.0-3ubuntu3 |
esm-infra-legacy/trusty | released | 4.0.3-7ubuntu0.11+esm16 |
esm-infra/bionic | released | 4.0.9-5ubuntu0.10+esm9 |
esm-infra/focal | released | 4.1.0+git191117-2ubuntu0.20.04.14+esm2 |
esm-infra/xenial | released | 4.0.6-1ubuntu0.8+esm19 |
jammy | released | 4.3.0-6ubuntu0.12 |
noble | released | 4.5.1+git230720-4ubuntu2.4 |
plucky | released | 4.5.1+git230720-4ubuntu4.2 |
questing | released | 4.7.0-3ubuntu3 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
8.8 High
CVSS3
Связанные уязвимости
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where ...
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
EPSS
8.8 High
CVSS3