An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libtiff-opengl",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiff-tools",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiff4-dev",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiff5",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiff5-alt-dev",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiff5-dev",
"binary_version": "4.0.3-7ubuntu0.6"
},
{
"binary_name": "libtiffxx5",
"binary_version": "4.0.3-7ubuntu0.6"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libtiff-opengl",
"binary_version": "4.0.6-1ubuntu0.1"
},
{
"binary_name": "libtiff-tools",
"binary_version": "4.0.6-1ubuntu0.1"
},
{
"binary_name": "libtiff5",
"binary_version": "4.0.6-1ubuntu0.1"
},
{
"binary_name": "libtiff5-dev",
"binary_version": "4.0.6-1ubuntu0.1"
},
{
"binary_name": "libtiffxx5",
"binary_version": "4.0.6-1ubuntu0.1"
}
]
}