ID CVE-2018-12900
Summary Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.
References
Vulnerable Configurations
  • cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 05-03-2021 - 19:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1595575
    title CVE-2018-12900 libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 8 is installed
        oval oval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • comment libtiff is earlier than 0:4.0.9-15.el8
            oval oval:com.redhat.rhsa:tst:20193419001
          • comment libtiff is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20110318007
        • AND
          • comment libtiff-debugsource is earlier than 0:4.0.9-15.el8
            oval oval:com.redhat.rhsa:tst:20193419003
          • comment libtiff-debugsource is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20193419004
        • AND
          • comment libtiff-devel is earlier than 0:4.0.9-15.el8
            oval oval:com.redhat.rhsa:tst:20193419005
          • comment libtiff-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20110318009
        • AND
          • comment libtiff-tools is earlier than 0:4.0.9-15.el8
            oval oval:com.redhat.rhsa:tst:20193419007
          • comment libtiff-tools is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20161546008
    rhsa
    id RHSA-2019:3419
    released 2019-11-05
    severity Moderate
    title RHSA-2019:3419: libtiff security update (Moderate)
  • rhsa
    id RHSA-2019:2053
rpms
  • libtiff-0:4.0.3-32.el7
  • libtiff-debuginfo-0:4.0.3-32.el7
  • libtiff-devel-0:4.0.3-32.el7
  • libtiff-static-0:4.0.3-32.el7
  • libtiff-tools-0:4.0.3-32.el7
  • libtiff-0:4.0.9-15.el8
  • libtiff-debuginfo-0:4.0.9-15.el8
  • libtiff-debugsource-0:4.0.9-15.el8
  • libtiff-devel-0:4.0.9-15.el8
  • libtiff-tools-0:4.0.9-15.el8
  • libtiff-tools-debuginfo-0:4.0.9-15.el8
refmap via4
debian DSA-4670
misc
mlist [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
ubuntu
  • USN-3906-1
  • USN-3906-2
Last major update 05-03-2021 - 19:15
Published 26-06-2018 - 22:29
Last modified 05-03-2021 - 19:15
Back to Top