CVE-2017-16232

LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html Third Party Advisory
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Dec/32 Mailing List Patch Third Party Advisory
http://seclists.org/fulldisclosure/2018/Dec/47 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/11 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/7 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101696 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html Third Party Advisory
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Dec/32 Mailing List Patch Third Party Advisory
http://seclists.org/fulldisclosure/2018/Dec/47 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/11 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/7 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101696 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.0.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*

History

No history.

Information

Published : 2019-03-21 15:59

Updated : 2024-11-21 03:16


NVD link : CVE-2017-16232

Mitre link : CVE-2017-16232

CVE.ORG link : CVE-2017-16232


JSON object : View

Products Affected

libtiff

  • libtiff

suse

  • linux_enterprise_desktop
  • linux_enterprise_server
  • linux_enterprise_software_development_kit

opensuse

  • leap
CWE
CWE-772

Missing Release of Resource after Effective Lifetime