Vigil@nce - LibTIFF: eight vulnerabilities
August 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of libtiff.
Impacted products: LibTIFF, openSUSE, RHEL.
Severity: 2/4.
Creation date: 15/06/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in libtiff.
An attacker can generate a buffer overflow via PixarLogDecode, in
order to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2016-5314, CVE-2016-5875]
An attacker can force a read at an invalid address in
setByteArray, in order to trigger a denial of service, or to
obtain sensitive information. [severity:1/4; CVE-2016-5315]
An attacker can force a read at an invalid address via
PixarLogCleanup, in order to trigger a denial of service, or to
obtain sensitive information. [severity:2/4; CVE-2016-5316]
An attacker can generate a memory corruption, in order to trigger
a denial of service, and possibly to run code. [severity:2/4;
CVE-2016-5317]
An attacker can force a division by 0, in order to deny service.
[severity:1/4; CVE-2016-5323]
An attacker can force a NULL pointer to be dereferenced, in order
to trigger a denial of service. [severity:1/4; CVE-2016-5321]
An attacker can force a read at an invalid address, in order to
trigger a denial of service, or to obtain sensitive information.
[severity:1/4; CVE-2016-5322]
An attacker can generate a buffer overflow, in order to trigger a
denial of service, and possibly to run code. [severity:2/4;
CVE-2016-5320]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/LibTIFF-eight-vulnerabilities-19905