DescriptionLibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs776185

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)wheezy4.0.2-6+deb7u5fixed
wheezy (security)4.0.2-6+deb7u16fixed
jessie (security), jessie4.0.3-12.3+deb8u4vulnerable
stretch (security), stretch4.0.8-2+deb9u1fixed
buster, sid4.0.8-5fixed
tiff3 (PTS)wheezy3.9.6-11fixed
wheezy (security)3.9.6-11+deb7u8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiff3source(unstable)(not affected)


- tiff3 <not-affected> (The tiff3 source package doesn't build the TIFF tools)
Advisory: (thumbnail)
Fix (tiff2bw) (tiff2rgba) (tiff2ps and tiffdither) (tiffmedian) (tiffset) [not fixed yet in CVS HEAD]
4.0.3-12.1 fixes all issues except 2500
2500 is fixed by upstream as per 2016-10-25
Crash in a frontend tool w/o potential for code injection, marked as unimportant

Search for package or bug name: Reporting problems