Vulnerability Description
In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libtiff | Libtiff | 4.0.8 |
Related Weaknesses (CWE)
References
- http://bugzilla.maptools.org/show_bug.cgi?id=2769ExploitIssue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/102331Third Party AdvisoryVDB Entry
- https://bugzilla.novell.com/show_bug.cgi?id=1074318
- https://bugzilla.redhat.com/show_bug.cgi?id=1530912
- http://bugzilla.maptools.org/show_bug.cgi?id=2769ExploitIssue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/102331Third Party AdvisoryVDB Entry
- https://bugzilla.novell.com/show_bug.cgi?id=1074318
- https://bugzilla.redhat.com/show_bug.cgi?id=1530912
FAQ
What is CVE-2017-17973?
CVE-2017-17973 is a vulnerability with a CVSS score of 8.8 (HIGH). In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue
How severe is CVE-2017-17973?
CVE-2017-17973 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17973?
Check the references section above for vendor advisories and patch information. Affected products include: Libtiff Libtiff.