Name | CVE-2017-9117 |
Description | In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tiff (PTS) | bullseye | 4.2.0-1+deb11u5 | vulnerable |
| bullseye (security) | 4.2.0-1+deb11u6 | vulnerable |
| bookworm | 4.5.0-6+deb12u2 | vulnerable |
| bookworm (security) | 4.5.0-6+deb12u1 | vulnerable |
| trixie | 4.5.1+git230720-5 | vulnerable |
| sid | 4.7.0-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tiff | source | (unstable) | (unfixed) | unimportant | | |
tiff3 | source | (unstable) | (not affected) | | | |
Notes
- tiff3 <not-affected> (Does not ship libtiff-tools)
http://bugzilla.maptools.org/show_bug.cgi?id=2690
bmp2tiff utility removed in 4.0.6-3 and 4.0.3-12.3+deb8u2