CVE-2017-9117

In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2690 Exploit Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/98581 Third Party Advisory VDB Entry
https://gitlab.com/libtiff/libtiff/-/issues/89
https://usn.ubuntu.com/3606-1/ Third Party Advisory
http://bugzilla.maptools.org/show_bug.cgi?id=2690 Exploit Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/98581 Third Party Advisory VDB Entry
https://usn.ubuntu.com/3606-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-05-21 19:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-9117

Mitre link : CVE-2017-9117

CVE.ORG link : CVE-2017-9117


JSON object : View

Products Affected

canonical

  • ubuntu_linux

libtiff

  • libtiff
CWE
CWE-125

Out-of-bounds Read