An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. Upstream issue: http://bugzilla.maptools.org/show_bug.cgi?id=2810 Upstream patch: https://gitlab.com/libtiff/libtiff/merge_requests/33/diffs?commit_id=6da1fb3f64d43be37e640efbec60400d1f1ac39e
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1631070] Created mingw-libtiff tracking bugs for this issue: Affects: epel-7 [bug 1631072] Affects: fedora-all [bug 1631071]
Analysis: Classic heap buffer overflow caused by integer overflow in ppm2tiff. The tool is used to concert ppm format files to TIFF.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2053 https://access.redhat.com/errata/RHSA-2019:2053
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17100