6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8 High
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
9.6%
Debian LTS Advisory DLA-3513-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
July 31, 2023 https://wiki.debian.org/LTS
Package : tiff
Version : 4.1.0+git191117-2~deb10u8
CVE ID : CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433
CVE-2023-26965 CVE-2023-26966 CVE-2023-38288 CVE-2023-38289
Debian Bug : 1040945
Multiple vulnerabilities were found in tiff, a library and tools
providing support for the Tag Image File Format (TIFF).
CVE-2023-2908
NULL pointer dereference in tif_dir.c
CVE-2023-3316
NULL pointer dereference in TIFFClose()
CVE-2023-3618
Buffer overflow in tiffcrop
CVE-2023-25433
Buffer overflow in tiffcrop
CVE-2023-26965
Use after free in tiffcrop
CVE-2023-26966
Buffer overflow in uv_encode()
CVE-2023-38288
Integer overflow in tiffcp
CVE-2023-38289
Integer overflow in raw2tiff
For Debian 10 buster, these problems have been fixed in version
4.1.0+git191117-2~deb10u8.
We recommend that you upgrade your tiff packages.
For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tiff
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | libtiff-dev | < 4.1.0+git191117-2~deb10u8 | libtiff-dev_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiff5-dev | < 4.1.0+git191117-2~deb10u8 | libtiff5-dev_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiff5 | < 4.1.0+git191117-2~deb10u8 | libtiff5_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiff-opengl | < 4.1.0+git191117-2~deb10u8 | libtiff-opengl_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiff-tools | < 4.1.0+git191117-2~deb10u8 | libtiff-tools_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | tiff | < 4.1.0+git191117-2~deb10u8 | tiff_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiff-doc | < 4.1.0+git191117-2~deb10u8 | libtiff-doc_4.1.0+git191117-2~deb10u8_all.deb |
Debian | 10 | all | libtiffxx5 | < 4.1.0+git191117-2~deb10u8 | libtiffxx5_4.1.0+git191117-2~deb10u8_all.deb |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8 High
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
9.6%