In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/99977 | vdb entry third party advisory |
https://usn.ubuntu.com/3606-1/ | vendor advisory |
https://gist.github.com/dazhouzhou/1a3b7400547f23fe316db303ab9b604f | third party advisory |
https://lists.debian.org/debian-lts-announce/2018/05/msg00022.html | mailing list |
https://www.debian.org/security/2018/dsa-4349 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html | mailing list |