CVE-2017-9404

NameCVE-2017-9404
DescriptionIn LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-983-1, DLA-984-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)stretch (security), stretch4.0.8-2+deb9u5fixed
buster, buster (security)4.1.0+git191117-2~deb10u2fixed
bullseye, sid4.2.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsourcewheezy4.0.2-6+deb7u14DLA-984-1
tiffsourcejessie4.0.3-12.3+deb8u4
tiffsource(unstable)4.0.8-1
tiff3sourcewheezy3.9.6-11+deb7u6DLA-983-1
tiff3source(unstable)(unfixed)

Notes

http://bugzilla.maptools.org/show_bug.cgi?id=2688
Fixed by: https://github.com/vadz/libtiff/commit/2ea32f7372b65c24b2816f11c04bf59b5090d05b
Possibly sensible to add the other memory leaks fixes in OJPEGReadHeaderInfoSecTables
method from tif_ojpeg.c, i.e.:
https://github.com/vadz/libtiff/commit/e9bd1b06fe25219cf0873fca70e46f01843fd9f4
https://github.com/vadz/libtiff/commit/8283e4d1b7e53340684d12932880cbcbaf23a8c1
Reproducing the issue itself is "covered" after fixing https://github.com/vadz/libtiff/commit/5ed9fea523316c2f5cec4d393e4d5d671c2dbc33
To verify 2ea32f7372b65c24b2816f11c04bf59b5090d05b fixes the issue build src:tiff
with ASAN with 5ed9fea523316c2f5cec4d393e4d5d671c2dbc33 reverted. Before the
2ea32f7372b65c24b2816f11c04bf59b5090d05b commit the Direct leak of 73 byte
with backtrace following the methods in http://bugzilla.maptools.org/show_bug.cgi?id=2688
is shown.

Search for package or bug name: Reporting problems