| Name | CVE-2015-7554 | 
| Description | The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-692-1, DLA-693-1 | 
| Debian Bugs | 809066, 842043, 850316 | 
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|
| tiff (PTS) | bullseye | 4.2.0-1+deb11u5 | fixed | 
 | bullseye (security) | 4.2.0-1+deb11u7 | fixed | 
 | bookworm | 4.5.0-6+deb12u2 | fixed | 
 | bookworm (security) | 4.5.0-6+deb12u3 | fixed | 
 | trixie | 4.7.0-3 | fixed | 
 | trixie (security) | 4.7.0-3+deb13u1 | fixed | 
 | forky, sid | 4.7.1-1 | fixed | 
The information below is based on the following data on fixed versions.
Notes
https://www.openwall.com/lists/oss-security/2015/12/26/7
SUSE seem to have a fix (disputed): https://bugzilla.suse.com/show_bug.cgi?id=960341
Reproducer file here: https://bugzilla.suse.com/attachment.cgi?id=665389
http://bugzilla.maptools.org/show_bug.cgi?id=2564
partially fixed by http://bugzilla.maptools.org/show_bug.cgi?id=2564#c2
--
The problem is present in tiff3 3.9.6-11+deb7u1 on wheezy (the problematic code
gets executed under gdb), however for some reason this does not lead to a segfault.