CVE-2018-5360

NameCVE-2018-5360
DescriptionLibTIFF before 4.0.6 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)jessie4.0.3-12.3+deb8u5undetermined
jessie (security)4.0.3-12.3+deb8u7undetermined
stretch4.0.8-2+deb9u2undetermined
stretch (security)4.0.8-2+deb9u4undetermined
buster, sid4.0.10-4undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsource(unstable)undeterminedmedium
tiff3source(unstable)undeterminedmedium

Notes

[wheezy] - tiff3 <postponed> (Minor issue, revisit once fixed upstream)
Issue demostrated in tiff via a vector through graphicsmagick, cf.
https://sourceforge.net/p/graphicsmagick/bugs/540/
Same issue as http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127)
fixed as per 2016-10-25 (first release to ship the patch seems to be 4.0.7)
https://gitlab.com/libtiff/libtiff/commit/739dcd28a061738b317c1e9f91029d9cbc157159
TODO check which exact Debian release contained the fix at first

Search for package or bug name: Reporting problems