{"id":"MGASA-2018-0493","summary":"Updated libtiff packages fix security vulnerabilities","details":"Heap-based buffer overflow in the cpSeparateBufToContigBuf function in\ntiffcp.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of\nservice (crash) or possibly have unspecified other impact via a crafted\nTIFF file. (CVE-2018-12900)\n\nLibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a\nbuffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode\nout-of-bounds write. (CVE-2018-18557)\n\nIn LibTIFF 4.0.9, there is a NULL pointer dereference in the\nTIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a\ndenial of service attack, as demonstrated by tiffset. (CVE-2018-19210)\n","modified":"2026-04-16T06:26:26.972673333Z","published":"2018-12-29T23:24:32Z","upstream":["CVE-2018-12900","CVE-2018-18557","CVE-2018-19210"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0493.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=24053"},{"type":"WEB","url":"https://www.debian.org/security/2018/dsa-4349"},{"type":"WEB","url":"https://lists.opensuse.org/opensuse-updates/2018-11/msg00138.html"},{"type":"WEB","url":"https://lists.opensuse.org/opensuse-updates/2018-12/msg00038.html"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/libtiff?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.9-1.9.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0493.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}