Vulnerability Name:

CVE-2015-8784 (CCN-110614)

Assigned:2016-01-24
Published:2016-01-24
Updated:2019-12-31
Summary:The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image, as demonstrated by libtiff5.tif.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
5.3 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
4.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Issue Tracking
http://bugzilla.maptools.org/show_bug.cgi?id=2508

Source: MITRE
Type: CNA
CVE-2015-8784

Source: CCN
Type: RHSA-2016-1546
Important: libtiff security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2016:1546

Source: CCN
Type: RHSA-2016-1547
Important: libtiff security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2016:1547

Source: CCN
Type: oss-sec Mailing List, Sun, 24 Jan 2016 13:07:26 -0500 (EST)
Re: CVE Request: tiff: potential out-of-bound write in NeXTDecode()

Source: DEBIAN
Type: Third Party Advisory
DSA-3467

Source: CCN
Type: IBM Security Bulletin T1024132 (PowerKVM)
Multiple vulnerabilities in libtiff affect PowerKVM

Source: CCN
Type: IBM Security Bulletin T1024193 (SmartCloud Entry)
Libtiff vulnerabilities affect IBM SmartClound Entry

Source: MLIST
Type: Mailing List
[oss-security] 20160124 CVE Request: tiff: potential out-of-bound write in NeXTDecode()

Source: MLIST
Type: Mailing List
[oss-security] 20160124 Re: CVE Request: tiff: potential out-of-bound write in NeXTDecode()

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Source: CCN
Type: LibTIFF Web site
LibTIFF - TIFF Library and Utilities

Source: BID
Type: Third Party Advisory, VDB Entry
81696

Source: CCN
Type: BID-81696
LibTIFF 'NeXTDecode()' Function Out of Bounds Write Memory Corruption Vulnerability

Source: UBUNTU
Type: Third Party Advisory
USN-2939-1

Source: CCN
Type: Red Hat Bugzilla – Bug 1301652
(CVE-2015-8784) CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode()

Source: XF
Type: UNKNOWN
libtiff-cve20158784-code-exec(110614)

Source: CCN
Type: LibTIFF GIT Repository
libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode()

Source: CONFIRM
Type: Patch
https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c

Source: GENTOO
Type: Third Party Advisory
GLSA-201701-16

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-8784

Vulnerable Configuration:Configuration 1:
  • cpe:/a:libtiff:libtiff:*:*:*:*:*:*:*:* (Version < 4.0.7)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:libtiff:libtiff:-:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:smartcloud_entry:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20161546
    P
    RHSA-2016:1546: libtiff security update (Important)
    2016-08-02
    oval:com.redhat.rhsa:def:20161547
    P
    RHSA-2016:1547: libtiff security update (Important)
    2016-08-02
    oval:com.ubuntu.xenial:def:20158784000
    V
    CVE-2015-8784 on Ubuntu 16.04 LTS (xenial) - low.
    2016-04-13
    oval:com.ubuntu.xenial:def:201587840000000
    V
    CVE-2015-8784 on Ubuntu 16.04 LTS (xenial) - low.
    2016-04-13
    oval:com.ubuntu.precise:def:20158784000
    V
    CVE-2015-8784 on Ubuntu 12.04 LTS (precise) - low.
    2016-04-13
    oval:com.ubuntu.trusty:def:20158784000
    V
    CVE-2015-8784 on Ubuntu 14.04 LTS (trusty) - low.
    2016-04-13
    BACK
    libtiff libtiff *
    debian debian linux 7.0
    debian debian linux 8.0
    libtiff libtiff -
    ibm smartcloud entry 3.1
    ibm smartcloud entry 3.2
    ibm smartcloud entry 2.3
    ibm smartcloud entry 2.4
    ibm powerkvm 2.1
    ibm powerkvm 3.1
    redhat enterprise linux desktop 7
    redhat enterprise linux hpc node 7
    redhat enterprise linux hpc node eus 7.2
    redhat enterprise linux server 7
    redhat enterprise linux server aus 7.2
    redhat enterprise linux server eus 7.2
    redhat enterprise linux workstation 7
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux server 6
    redhat enterprise linux workstation 6