An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
{
"binaries": [
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff-opengl"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff-tools"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff4-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff5"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff5-alt-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiff5-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.6",
"binary_name": "libtiffxx5"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "4.0.6-1ubuntu0.1",
"binary_name": "libtiff-opengl"
},
{
"binary_version": "4.0.6-1ubuntu0.1",
"binary_name": "libtiff-tools"
},
{
"binary_version": "4.0.6-1ubuntu0.1",
"binary_name": "libtiff5"
},
{
"binary_version": "4.0.6-1ubuntu0.1",
"binary_name": "libtiff5-dev"
},
{
"binary_version": "4.0.6-1ubuntu0.1",
"binary_name": "libtiffxx5"
}
],
"availability": "No subscription required"
}