|
Message-ID: <57017841-788f-5012-bc78-b70328d349a5@oracle.com> Date: Sat, 18 Mar 2017 18:42:51 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2016-3631 - libtiff 4.0.6 illegel read On 04/ 8/16 12:12 AM, 张开翔 wrote: > Details > ======= > > Product: libtiff > Affected Versions: <= 4.0.6 > Vulnerability Type: Illegel read > Vendor URL: http://www.libtiff.org/ > CVE ID: CVE-2016-3631 > Credit: Kaixiang Zhang of the Cloud Security Team, Qihoo 360 > > Introduction > > Illegal read occurs in the cpStrips and cpTiles function in thumbnail.c in thumbnail allows attackers to exploit this issue to cause denial-of-service. While this CVE is not listed in the libtiff 4.0.7 release notes, that version appears to resolve it via this release note item: 'The libtiff tools rgb2ycbcr and thumbnail are only built in the build tree for testing.' I still can't find a bug id specifically for this one in the libtiff bug tracker, but for the similar CVE-2016-3634 this removal is listed as the resolution in http://bugzilla.maptools.org/show_bug.cgi?id=2547 . -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - http://blogs.oracle.com/alanc
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.