CVE-2017-11613

Priority
Description
In LibTIFF 4.0.8, there is a denial of service vulnerability in the
TIFFOpen function. A crafted input will lead to a denial of service attack.
During the TIFFOpen process, td_imagelength is not checked. The value of
td_imagelength can be directly controlled by an input file. In the
ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is
called based on td_imagelength. If we set the value of td_imagelength close
to the amount of system memory, it will hang the system or trigger the OOM
killer.
Notes
mdeslaurwe will not be fixing this issue in precise/esm
Package
Source: tiff (LP Ubuntu Debian)
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):ignored
Ubuntu 14.04 ESM (Trusty Tahr):released (4.0.3-7ubuntu0.9)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.0.6-1ubuntu0.4)
Ubuntu 18.04 LTS (Bionic Beaver):released (4.0.9-4ubuntu1)
Patches:
Upstream:https://gitlab.com/libtiff/libtiff/commit/3719385a3fac5cfb20b487619a5f08abbf967cf8
Upstream:https://gitlab.com/libtiff/libtiff/commit/7a092f8af2568d61993a8cc2e7a35a998d7d37be
More Information

Updated: 2020-09-10 05:35:56 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)