Bug 1524284 (CVE-2017-17095)

Summary: CVE-2017-17095 libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: nforro, phracek, tgl
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in LibTIFF, where a heap-based buffer overflow in the pal2rgb function in tools/pal2rgb.c can lead to a denial of service, a remote attacker could exploit this flaw by persuading a victim to open a specially crafted file, causing the application to crash.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-18 07:24:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1524285, 1526899, 1910611    
Bug Blocks: 1524288    

Description Sam Fowler 2017-12-11 07:13:39 UTC
The pal2rgb tool (tools/pal2rgb.c) in LibTIFF 4.0.9 is vulnerable to a heap-based bufferflow when parsing a specially crafted .tif file. A remote attacker could exploit this to cause an application crash (denial of service) or other possible unspecified impact.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17095
http://www.openwall.com/lists/oss-security/2017/11/30/3
http://www.cvedetails.com/cve/CVE-2017-17095/
http://bugzilla.maptools.org/show_bug.cgi?id=2750

Comment 1 Sam Fowler 2017-12-11 07:14:03 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1524285]

Comment 2 Huzaifa S. Sidhpurwala 2017-12-18 07:23:07 UTC
Note: As per upstream bug, there is currently no patch yet. The proposed patch seems to be insufficient, since the issue still manifests after the patch is applied.

Comment 6 errata-xmlrpc 2025-05-07 09:39:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:4658 https://access.redhat.com/errata/RHSA-2025:4658