Vulnerability Details : CVE-2018-7456
Potential exploit
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
Vulnerability category: Memory Corruption
Products affected by CVE-2018-7456
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-7456
1.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-7456
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-7456
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-7456
-
https://gitlab.com/libtiff/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b
Fix NULL pointer dereference in TIFFPrintDirectory (be4c85b1) · Commits · libtiff / libtiff · GitLabPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00010.html
[SECURITY] [DLA 1346-1] tiff security updateMailing List;Third Party Advisory
-
https://usn.ubuntu.com/3864-1/
USN-3864-1: LibTIFF vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2051
RHSA-2019:2051 - Security Advisory - Red Hat Customer Portal
-
https://www.debian.org/security/2018/dsa-4349
Debian -- Security Information -- DSA-4349-1 tiffThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html
[SECURITY] [DLA 1411-1] tiff security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2053
RHSA-2019:2053 - Security Advisory - Red Hat Customer Portal
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00011.html
[SECURITY] [DLA 1347-1] tiff3 security updateMailing List;Third Party Advisory
-
https://github.com/xiaoqx/pocs/tree/master/libtiff
pocs/libtiff at master · xiaoqx/pocs · GitHubExploit;Third Party Advisory
-
http://bugzilla.maptools.org/show_bug.cgi?id=2778
Bug 2778 – A NULL Pointer Dereference in libtiff (CVE-2018-7456)Exploit;Issue Tracking;Third Party Advisory
Jump to