9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.091 Low
EPSS
Percentile
94.5%
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.10 | noarch | libtiff-tools | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff-doc | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff-opengl | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff-opengl-dbgsym | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff-tools-dbgsym | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff5 | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff5-dbgsym | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiff5-dev | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiffxx5 | < 4.0.6-2ubuntu0.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libtiffxx5-dbgsym | < 4.0.6-2ubuntu0.1 | UNKNOWN |
ubuntu.com/security/CVE-2015-7554
ubuntu.com/security/CVE-2015-8668
ubuntu.com/security/CVE-2016-10092
ubuntu.com/security/CVE-2016-10093
ubuntu.com/security/CVE-2016-10094
ubuntu.com/security/CVE-2016-3622
ubuntu.com/security/CVE-2016-3623
ubuntu.com/security/CVE-2016-3624
ubuntu.com/security/CVE-2016-3632
ubuntu.com/security/CVE-2016-3658
ubuntu.com/security/CVE-2016-3945
ubuntu.com/security/CVE-2016-3990
ubuntu.com/security/CVE-2016-3991
ubuntu.com/security/CVE-2016-5314
ubuntu.com/security/CVE-2016-5315
ubuntu.com/security/CVE-2016-5316
ubuntu.com/security/CVE-2016-5317
ubuntu.com/security/CVE-2016-5320
ubuntu.com/security/CVE-2016-5321
ubuntu.com/security/CVE-2016-5322
ubuntu.com/security/CVE-2016-5323
ubuntu.com/security/CVE-2016-5652
ubuntu.com/security/CVE-2016-5875
ubuntu.com/security/CVE-2016-6223
ubuntu.com/security/CVE-2016-8331
ubuntu.com/security/CVE-2016-9273
ubuntu.com/security/CVE-2016-9297
ubuntu.com/security/CVE-2016-9448
ubuntu.com/security/CVE-2016-9453
ubuntu.com/security/CVE-2016-9532
ubuntu.com/security/CVE-2016-9533
ubuntu.com/security/CVE-2016-9534
ubuntu.com/security/CVE-2016-9535
ubuntu.com/security/CVE-2016-9536
ubuntu.com/security/CVE-2016-9537
ubuntu.com/security/CVE-2016-9538
ubuntu.com/security/CVE-2016-9539
ubuntu.com/security/CVE-2016-9540
ubuntu.com/security/CVE-2017-5225
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.091 Low
EPSS
Percentile
94.5%