8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.057 Low
EPSS
Percentile
93.2%
USN-2553-1 fixed vulnerabilities in LibTIFF. One of the security fixes
caused a regression when saving certain TIFF files with a Predictor tag.
The problematic patch has been temporarily backed out until a more complete
fix is available.
We apologize for the inconvenience.
Original advisory details:
William Robinet discovered that LibTIFF incorrectly handled certain
malformed images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the application,
leading to a denial of service, or possibly execute arbitrary code with
user privileges. (CVE-2014-8127, CVE-2014-8128, CVE-2014-8129,
CVE-2014-8130)
Paris Zoumpouloglou discovered that LibTIFF incorrectly handled certain
malformed BMP images. If a user or automated system were tricked into
opening a specially crafted BMP image, a remote attacker could crash the
application, leading to a denial of service. (CVE-2014-9330)
Michal Zalewski discovered that LibTIFF incorrectly handled certain
malformed images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the application,
leading to a denial of service, or possibly execute arbitrary code with
user privileges. (CVE-2014-9655)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.10 | noarch | libtiff5 | < 4.0.3-10ubuntu0.2 | UNKNOWN |
Ubuntu | 14.10 | noarch | libtiff-opengl | < 4.0.3-10ubuntu0.2 | UNKNOWN |
Ubuntu | 14.10 | noarch | libtiff-tools | < 4.0.3-10ubuntu0.2 | UNKNOWN |
Ubuntu | 14.10 | noarch | libtiff5-dev | < 4.0.3-10ubuntu0.2 | UNKNOWN |
Ubuntu | 14.10 | noarch | libtiffxx5 | < 4.0.3-10ubuntu0.2 | UNKNOWN |
Ubuntu | 14.04 | noarch | libtiff5 | < 4.0.3-7ubuntu0.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libtiff-opengl | < 4.0.3-7ubuntu0.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libtiff-tools | < 4.0.3-7ubuntu0.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libtiff4-dev | < 4.0.3-7ubuntu0.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libtiff5-alt-dev | < 4.0.3-7ubuntu0.3 | UNKNOWN |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.057 Low
EPSS
Percentile
93.2%