CVE-2014-8130
high-risk
Published 2018-03-12
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
Do I need to act?
~
2.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
References (28)
Mailing List
http://openwall.com/lists/oss-security/2015/01/24/15
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1546.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1547.html
Third Party Advisory
http://support.apple.com/kb/HT204941
Third Party Advisory
http://support.apple.com/kb/HT204942
Third Party Advisory
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
Third Party Advisory
http://www.securityfocus.com/bid/72353
Third Party Advisory
http://www.securitytracker.com/id/1032760
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
Third Party Advisory
https://security.gentoo.org/glsa/201701-16
Mailing List
http://openwall.com/lists/oss-security/2015/01/24/15
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1546.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1547.html
and 8 more references
50
/ 100
high-risk
Severity
24/34 · High
Exploitability
5/34 · Minimal
Exposure
21/34 · High