The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of LibTIFF: buffer overflow via ChopUpSingleUncompressedStrip

Synthesis of the vulnerability 

An attacker can generate a buffer overflow via ChopUpSingleUncompressedStrip() of LibTIFF, in order to trigger a denial of service, and possibly to run code.
Vulnerable systems: Debian, LibTIFF, Solaris.
Severity of this threat: 2/4.
Creation date: 09/08/2018.
Références of this weakness: 2808, bulletinjan2019, bulletinoct2018, CVE-2018-15209, DSA-4349-1, VIGILANCE-VUL-26936.

Description of the vulnerability 

An attacker can generate a buffer overflow via ChopUpSingleUncompressedStrip() of LibTIFF, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability impacts software or systems such as Debian, LibTIFF, Solaris.

Our Vigil@nce team determined that the severity of this weakness bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this weakness.

Solutions for this threat 

LibTIFF: patch for ChopUpSingleUncompressedStrip.
A patch is indicated in information sources.

Debian 9: new tiff packages.
New packages are available:
  Debian 9: tiff 4.0.8-2+deb9u4

Oracle Solaris: patch for third party software of January 2019 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle Solaris: patch for third party software of October 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computers vulnerabilities alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.