Vulnerability Details : CVE-2018-17100
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2018-17100
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-17100
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-17100
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-17100
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-17100
-
http://bugzilla.maptools.org/show_bug.cgi?id=2810
Bug 2810 – potential int32 overflow in multiply_ms() functionIssue Tracking;Patch;Third Party Advisory
-
https://usn.ubuntu.com/3906-2/
USN-3906-2: LibTIFF vulnerabilities | Ubuntu security notices
-
https://lists.debian.org/debian-lts-announce/2018/10/msg00019.html
[SECURITY] [DLA 1557-1] tiff security updateMailing List;Third Party Advisory
-
https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=6da1fb3f64d43be37e640efbec60400d1f1ac39e
fix three potential vulnerabilities. (!33) · Merge Requests · libtiff / libtiff · GitLabPatch;Third Party Advisory
-
https://usn.ubuntu.com/3864-1/
USN-3864-1: LibTIFF vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2053
RHSA-2019:2053 - Security Advisory - Red Hat Customer Portal
-
https://www.debian.org/security/2020/dsa-4670
Debian -- Security Information -- DSA-4670-1 tiff
Jump to