Updated libtiff packages fix security vulnerabilities. Heap-based buffer overflows and NULL pointer dereference in LibTIFF 4.0.9 allow remote attackers to cause denial of service or unspecified impact via crafted TIFF files
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Mageia: Security Advisory (MGASA-2018-0493) | 28 Jan 202200:00 | – | openvas |
![]() | openSUSE: Security Advisory for tiff (openSUSE-SU-2018:3947-1) | 4 Dec 201800:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2018:3911-1) | 19 Apr 202100:00 | – | openvas |
![]() | openSUSE: Security Advisory for tiff (openSUSE-SU-2018:3948-1) | 4 Dec 201800:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2018:3911-2) | 19 Apr 202100:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2018:3925-1) | 9 Jun 202100:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libtiff (EulerOS-SA-2019-1629) | 23 Jan 202000:00 | – | openvas |
![]() | Fedora Update for libtiff FEDORA-2019-fa3e40f00a | 29 Jun 201900:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-3906-1) | 13 Mar 201900:00 | – | openvas |
![]() | Fedora Update for libtiff FEDORA-2019-e45019c690 | 15 Dec 201900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Mageia | 6 | noarch | libtiff | 4.0.9-1.9 | libtiff-4.0.9-1.9.mga6 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo