MEDIUM · 6.5

CVE-2018-5784

In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a cra...

Vulnerability Description

In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.

CVSS Score

6.5

MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
LibtiffLibtiff4.0.9
DebianDebian Linux7.0
CanonicalUbuntu Linux14.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-5784?

CVE-2018-5784 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a cra...

How severe is CVE-2018-5784?

CVE-2018-5784 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-5784?

Check the references section above for vendor advisories and patch information. Affected products include: Libtiff Libtiff, Debian Debian Linux, Canonical Ubuntu Linux.