CVE-2014-8129
high-risk
Published 2018-03-12
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
Do I need to act?
~
1.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (30)
Mailing List
http://openwall.com/lists/oss-security/2015/01/24/15
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1546.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1547.html
Third Party Advisory
http://support.apple.com/kb/HT204941
Third Party Advisory
http://support.apple.com/kb/HT204942
Third Party Advisory
http://www.conostix.com/pub/adv/CVE-2014-8129-LibTIFF-Out-of-bounds_Reads_and_Wr...
Third Party Advisory
http://www.securityfocus.com/bid/72352
Third Party Advisory
http://www.securitytracker.com/id/1032760
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1185815
Third Party Advisory
https://security.gentoo.org/glsa/201701-16
Third Party Advisory
https://www.debian.org/security/2015/dsa-3273
Mailing List
http://openwall.com/lists/oss-security/2015/01/24/15
and 10 more references
54
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
4/34 · Minimal
Exposure
20/34 · Moderate