1
PublicDateAtUSN: 2017-06-26
2
Candidate: CVE-2017-9935
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935
6
https://usn.ubuntu.com/usn/usn-3606-1
8
In LibTIFF 4.0.8, there is a heap-based buffer overflow in the
9
t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead
10
to different damages. For example, a crafted TIFF document can lead to an
11
out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or
12
t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in
13
t2p_free. Given these possibilities, it probably could cause arbitrary code
17
ratliff> reproducer errors out rather than crashing on trusty & zesty
18
sbeattie> possibly only affects tiff tools, not libtiff itself
19
mdeslaur> patch in upstream bug
20
mdeslaur> we will not be fixing this issue in precise/esm
22
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866109
23
http://bugzilla.maptools.org/show_bug.cgi?id=2704
29
upstream: https://gitlab.com/libtiff/libtiff/commit/3dd8f6a357981a4090f126ab9025056c938b6940
30
upstream: https://gitlab.com/libtiff/libtiff/commit/d4f213636b6f950498a1386083199bd7f65676b9
31
upstream_tiff: released (4.0.9-2)
32
precise/esm_tiff: ignored
33
trusty_tiff: released (4.0.3-7ubuntu0.9)
34
vivid/ubuntu-core_tiff: DNE
35
xenial_tiff: released (4.0.6-1ubuntu0.4)
36
yakkety_tiff: ignored (reached end-of-life)
37
zesty_tiff: ignored (reached end-of-life)
38
artful_tiff: released (4.0.8-5ubuntu0.1)
39
devel_tiff: not-affected (4.0.9-4)