In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff-opengl"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff-tools"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff4-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff5"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff5-alt-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiff5-dev"
},
{
"binary_version": "4.0.3-7ubuntu0.8",
"binary_name": "libtiffxx5"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.0.6-1ubuntu0.3",
"binary_name": "libtiff-opengl"
},
{
"binary_version": "4.0.6-1ubuntu0.3",
"binary_name": "libtiff-tools"
},
{
"binary_version": "4.0.6-1ubuntu0.3",
"binary_name": "libtiff5"
},
{
"binary_version": "4.0.6-1ubuntu0.3",
"binary_name": "libtiff5-dev"
},
{
"binary_version": "4.0.6-1ubuntu0.3",
"binary_name": "libtiffxx5"
}
]
}