CVE-2023-1916
Published: 10 April 2023
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
Notes
Author | Note |
---|---|
mdeslaur | low security impact as it is a denial of service in a command- line tool only, marking as low priority |
ccdm94 | As of 2023-08-22, the fix for this issue seems to have not been merged (https://gitlab.com/libtiff/libtiff/-/merge_requests/476). |
mdeslaur | There is a new merge request here: https://gitlab.com/libtiff/libtiff/-/merge_requests/535 Since the tiffcrop tool has been removed, the merge request will go nowhere, but can likely be used to fix previous releases. |
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
bionic |
Released
(4.0.9-5ubuntu0.10+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
focal |
Released
(4.1.0+git191117-2ubuntu0.20.04.10)
|
|
jammy |
Released
(4.3.0-6ubuntu0.6)
|
|
kinetic |
Ignored
(end of life, was deferred [2023-08-22])
|
|
lunar |
Released
(4.5.0-5ubuntu1.2)
|
|
mantic |
Needed
|
|
noble |
Pending
(4.5.1+git230720-4ubuntu1)
|
|
trusty |
Released
(4.0.3-7ubuntu0.11+esm10)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Needed
|
|
xenial |
Released
(4.0.6-1ubuntu0.8+esm13)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches: upstream: https://gitlab.com/libtiff/libtiff/-/commit/848434a81c443f59ec90d41218eba6e48a450a11 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H |