Slackware Linux update for libtiff

Published: 2019-11-05




Severity
Medium
Patch available
YES
Number of vulnerabilities
3
CVE ID
CVE-2018-19210CVE-2019-14973CVE-2019-6128
CWE ID
CWE-476CWE-190CWE-401
Exploitation vector
Network
Public exploit
Public exploit code for vulnerability #1 is available.
Vulnerable software
Slackware Linux Subscribe
Vendor
Slackware

Security Advisory



1) NULL pointer dereference


Severity: Low


CVSSv3: 4.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:U/RC:C] [PCI]


CVE-ID: CVE-2018-19210


CWE-ID: CWE-476 - NULL Pointer Dereference


Description

The vulnerability allows a remote attacker to cause DoS condition.


The vulnerability exists due to insufficient validation of user-supplied input processed by the TIFFWriteDirectorySec function, as defined in the tif_dirwrite.c source code file. A remote attacker can trick the victim into opening or executing a file that submits malicious input, trigger a NULL pointer dereference and cause the service to crash.


Mitigation

Update the affected package libtiff.


Vulnerable software versions

Slackware Linux: 14.2


CPE
External links

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.359847


Q & A


Can this vulnerability be exploited remotely?


Yes. This vulnerability can be exploited by a remote non-authenticated attacker via th ..

Support the originator by clicking the read the rest link below.