1124 lines
58 KiB
JSON
1124 lines
58 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20191628",
|
||
"Version": "oval:org.altlinux.errata:def:20191628",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-1628: package `libtiff` update to version 4.0.10.0.57.f9fc01c3-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-1628",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1628",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-06338",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-06338",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-06339",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-06339",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-06340",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-06340",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-06344",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-06344",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-06345",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-06345",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-08609",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-08609",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-08610",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-08610",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-08611",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-08611",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-08612",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-08612",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-09010",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-09010",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-09718",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-09718",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-00538",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-00538",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-00539",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-00539",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-00540",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-00540",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-01124",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-01124",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02189",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02189",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02190",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02190",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02191",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02191",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02192",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02192",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00327",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00327",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00329",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00329",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00330",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00330",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00883",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00883",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01070",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01070",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00107",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00107",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03213",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03213",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2012-4564",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2012-4564",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-1960",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1960",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-1961",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1961",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4232",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4232",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4243",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4243",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4244",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4244",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-8127",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8127",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-8129",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8129",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-8130",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8130",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-9330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-9655",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9655",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-1547",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1547",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8781",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8781",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8782",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8782",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8783",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8783",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8784",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8784",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8870",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8870",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3620",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3620",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3621",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3621",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3623",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3623",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3624",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3624",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3625",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3625",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3631",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3631",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3632",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3632",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3634",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3634",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3658",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3658",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3990",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3990",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3991",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3991",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5102",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5102",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5314",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5314",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5315",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5315",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5316",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5316",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5319",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5319",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5321",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5321",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5323",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5323",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9453",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9453",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9532",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9532",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-9935",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9935",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-9937",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9937",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10963",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10963",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12900",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12900",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5360",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5360",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14973",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14973",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades libtiff to version 4.0.10.0.57.f9fc01c3-alt1. \nSecurity Fix(es):\n\n * BDU:2015-06338: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-06339: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-06340: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-06344: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-06345: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-08609: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-08610: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-08611: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-08612: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09010: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09718: Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2016-00538: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00539: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00540: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-01124: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-02189: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-02190: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-02191: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-02192: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00327: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00328: Уязвимость операционной системы openSUSE, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00329: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2017-00330: Уязвимость библиотеки LibTIFF, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2017-00883: Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01070: Уязвимость функции TIFFWriteDirectorySec() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00107: Уязвимость функций _TIFFCheckMalloc и _TIFFCheckRealloc (tif_aux.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03213: Уязвимость функции cpSeparateBufToContigBuf программного обеспечения для просмотра, редактирования и конвертирования TIFF-файлов, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2012-4564: ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.\n\n * CVE-2013-1960: Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.\n\n * CVE-2013-1961: Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.\n\n * CVE-2013-4232: Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.\n\n * CVE-2013-4243: Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.\n\n * CVE-2013-4244: The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.\n\n * CVE-2014-8127: LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.\n\n * CVE-2014-8129: LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.\n\n * CVE-2014-8130: The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.\n\n * CVE-2014-9330: Integer overflow in tif_packbits.c in bmp2tif in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) via crafted BMP image, related to dimensions, which triggers an out-of-bounds read.\n\n * CVE-2014-9655: The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.\n\n * CVE-2015-1547: The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.\n\n * CVE-2015-8781: tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.\n\n * CVE-2015-8782: tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.\n\n * CVE-2015-8783: tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.\n\n * CVE-2015-8784: The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image, as demonstrated by libtiff5.tif.\n\n * CVE-2015-8870: Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.\n\n * CVE-2016-3620: The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c zip\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\n\n * CVE-2016-3621: The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\n\n * CVE-2016-3623: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.\n\n * CVE-2016-3624: The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the \"-v\" option to -1.\n\n * CVE-2016-3625: tif_read.c in the tiff2bw tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.\n\n * CVE-2016-3631: The (1) cpStrips and (2) cpTiles functions in the thumbnail tool in LibTIFF 4.0.6 and earlier allow remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the bytecounts[] array variable.\n\n * CVE-2016-3632: The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.\n\n * CVE-2016-3633: The setrow function in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the src variable.\n\n * CVE-2016-3634: The tagCompare function in tif_dirinfo.c in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to field_tag matching.\n\n * CVE-2016-3658: The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.\n\n * CVE-2016-3945: Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.\n\n * CVE-2016-3990: Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.\n\n * CVE-2016-3991: Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.\n\n * CVE-2016-5102: Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.\n\n * CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.\n\n * CVE-2016-5315: The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.\n\n * CVE-2016-5316: Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.\n\n * CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.\n\n * CVE-2016-5319: Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.\n\n * CVE-2016-5321: The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.\n\n * CVE-2016-5322: The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.\n\n * CVE-2016-5323: The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.\n\n * CVE-2016-6223: The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer.\n\n * CVE-2016-9453: The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.\n\n * CVE-2016-9532: Integer overflow in the writeBufferToSeparateStrips function in tiffcrop.c in LibTIFF before 4.0.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tif file.\n\n * CVE-2017-9935: In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.\n\n * CVE-2017-9937: In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.\n\n * CVE-2018-10963: The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.\n\n * CVE-2018-12900: Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.\n\n * CVE-2018-5360: LibTIFF before 4.0.6 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.\n\n * CVE-2019-14973: _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.\n\n * #34677: libtiff-devel: new version\n\n * #36575: libtiff необходимо обновить",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-04-10"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-04-10"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2015-06338",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-06338",
|
||
"Impact": "Critical",
|
||
"Public": "20140227"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-06339",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-06339",
|
||
"Impact": "Critical",
|
||
"Public": "20140227"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-06340",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-06340",
|
||
"Impact": "Critical",
|
||
"Public": "20140227"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-06344",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-06344",
|
||
"Impact": "Critical",
|
||
"Public": "20140227"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-06345",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-06345",
|
||
"Impact": "Critical",
|
||
"Public": "20140227"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-08609",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-08609",
|
||
"Impact": "Critical",
|
||
"Public": "20140228"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-08610",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-08610",
|
||
"Impact": "Critical",
|
||
"Public": "20140228"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-08611",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-08611",
|
||
"Impact": "Critical",
|
||
"Public": "20140228"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-08612",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-08612",
|
||
"Impact": "Critical",
|
||
"Public": "20140228"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-09010",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-09010",
|
||
"Impact": "Critical",
|
||
"Public": "20140228"
|
||
},
|
||
{
|
||
"ID": "BDU:2015-09718",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-09718",
|
||
"Impact": "Critical",
|
||
"Public": "20140221"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-00538",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-00538",
|
||
"Impact": "Low",
|
||
"Public": "20160202"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-00539",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-00539",
|
||
"Impact": "Low",
|
||
"Public": "20160202"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-00540",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-00540",
|
||
"Impact": "Low",
|
||
"Public": "20160202"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-01124",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-01124",
|
||
"Impact": "Low",
|
||
"Public": "20160413"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02189",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02189",
|
||
"Impact": "Low",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02190",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02190",
|
||
"Impact": "Low",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02191",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02191",
|
||
"Impact": "Low",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02192",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02192",
|
||
"Impact": "Low",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00327",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00327",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00328",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00328",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00329",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00329",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00330",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00330",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00883",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00883",
|
||
"Impact": "Low",
|
||
"Public": "20170307"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01070",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20, CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01070",
|
||
"Impact": "Low",
|
||
"Public": "20181205"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00107",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00107",
|
||
"Impact": "Low",
|
||
"Public": "20190814"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03213",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03213",
|
||
"Impact": "High",
|
||
"Public": "20180629"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2012-4564",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2012-4564",
|
||
"Impact": "Low",
|
||
"Public": "20121111"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-1960",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1960",
|
||
"Impact": "Critical",
|
||
"Public": "20130703"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-1961",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1961",
|
||
"Impact": "Critical",
|
||
"Public": "20130703"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4232",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4232",
|
||
"Impact": "Low",
|
||
"Public": "20130910"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4243",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4243",
|
||
"Impact": "Low",
|
||
"Public": "20130910"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4244",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4244",
|
||
"Impact": "Low",
|
||
"Public": "20130928"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-8127",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8127",
|
||
"Impact": "Low",
|
||
"Public": "20170626"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-8129",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8129",
|
||
"Impact": "High",
|
||
"Public": "20180312"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-8130",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8130",
|
||
"Impact": "Low",
|
||
"Public": "20180312"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-9330",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-189",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9330",
|
||
"Impact": "Low",
|
||
"Public": "20150120"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-9655",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9655",
|
||
"Impact": "Low",
|
||
"Public": "20160413"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-1547",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1547",
|
||
"Impact": "Low",
|
||
"Public": "20160413"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8781",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8781",
|
||
"Impact": "Low",
|
||
"Public": "20160201"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8782",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8782",
|
||
"Impact": "Low",
|
||
"Public": "20160201"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8783",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8783",
|
||
"Impact": "Low",
|
||
"Public": "20160201"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8784",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8784",
|
||
"Impact": "Low",
|
||
"Public": "20160413"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8870",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8870",
|
||
"Impact": "High",
|
||
"Public": "20161206"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3620",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3620",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3621",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3621",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3623",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3623",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3624",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3624",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3625",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3625",
|
||
"Impact": "Low",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3631",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3631",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3632",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3632",
|
||
"Impact": "High",
|
||
"Public": "20160921"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3633",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3633",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3634",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3634",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3658",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3658",
|
||
"Impact": "High",
|
||
"Public": "20161003"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3945",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3945",
|
||
"Impact": "High",
|
||
"Public": "20160921"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3990",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3990",
|
||
"Impact": "High",
|
||
"Public": "20160921"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3991",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3991",
|
||
"Impact": "High",
|
||
"Public": "20160921"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5102",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5102",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5314",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5314",
|
||
"Impact": "High",
|
||
"Public": "20180312"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5315",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5315",
|
||
"Impact": "Low",
|
||
"Public": "20170307"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5316",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5316",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5318",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5318",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5319",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5319",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5321",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5321",
|
||
"Impact": "Low",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5322",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322",
|
||
"Impact": "Low",
|
||
"Public": "20170411"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5323",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5323",
|
||
"Impact": "High",
|
||
"Public": "20170120"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6223",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-189",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6223",
|
||
"Impact": "Critical",
|
||
"Public": "20170123"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9453",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9453",
|
||
"Impact": "High",
|
||
"Public": "20170127"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9532",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9532",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-9935",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9935",
|
||
"Impact": "High",
|
||
"Public": "20170626"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-9937",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9937",
|
||
"Impact": "Low",
|
||
"Public": "20170626"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10963",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10963",
|
||
"Impact": "Low",
|
||
"Public": "20180510"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12900",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12900",
|
||
"Impact": "High",
|
||
"Public": "20180626"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5360",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5360",
|
||
"Impact": "High",
|
||
"Public": "20180114"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-14973",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14973",
|
||
"Impact": "Low",
|
||
"Public": "20190814"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "34677",
|
||
"Href": "https://bugzilla.altlinux.org/34677",
|
||
"Data": "libtiff-devel: new version"
|
||
},
|
||
{
|
||
"ID": "36575",
|
||
"Href": "https://bugzilla.altlinux.org/36575",
|
||
"Data": "libtiff необходимо обновить"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628001",
|
||
"Comment": "libtiff-devel is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628002",
|
||
"Comment": "libtiff-utils is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628003",
|
||
"Comment": "libtiff5 is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628004",
|
||
"Comment": "libtiffxx-devel is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628005",
|
||
"Comment": "libtiffxx5 is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191628006",
|
||
"Comment": "tiffgt is earlier than 0:4.0.10.0.57.f9fc01c3-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |