Published: 2019-11-05
Severity
Medium
Patch available
YES
Number of vulnerabilities
3
CVE ID
CVE-2018-19210CVE-2019-14973CVE-2019-6128
CWE ID
CWE-476CWE-190CWE-401
Exploitation vector
Network
Public exploit
Public exploit code for vulnerability #1 is available.
Vulnerable software
Slackware Linux Subscribe
Vendor
Slackware
Security Advisory
1) NULL pointer dereference
Severity: Low
CVSSv3: 4.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:U/RC:C] [PCI]
CVE-ID: CVE-2018-19210
CWE-ID: CWE-476 - NULL Pointer Dereference
Description
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to insufficient validation of user-supplied input processed by the TIFFWriteDirectorySec function, as defined in the tif_dirwrite.c source code file. A remote attacker can trick the victim into opening or executing a file that submits malicious input, trigger a NULL pointer dereference and cause the service to crash.
Mitigation
Update the affected package libtiff.
Vulnerable software versions
Slackware Linux: 14.2
CPE
External links
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.359847
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via th ..
Support the originator by clicking the read the rest link below.