Integer Overflow or Wraparound Affecting libtiff-static package, versions <0:4.0.3-32.el7


Severity

Recommended
medium

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.52% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-LIBTIFFSTATIC-2538230
  • published10 Apr 2022
  • disclosed16 Sept 2018

Introduced: 16 Sep 2018

CVE-2018-17100  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Oracle:7 libtiff-static to version 0:4.0.3-32.el7 or higher.
This issue was patched in ELSA-2019-2053.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libtiff-static package and not the libtiff-static package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.