SUSE SLES12 Security Update : tiff (SUSE-SU-2023:4371-1)

medium Nessus Plugin ID 184800

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:4371-1 advisory.

- There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file. (CVE-2020-18768)

- libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. (CVE-2023-25433)

- libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian. (CVE-2023-26966)

- A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
(CVE-2023-2908)

- A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones. (CVE-2023-3316)

- A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
(CVE-2023-3576)

- A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
(CVE-2023-3618)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libtiff-devel, libtiff5, libtiff5-32bit and / or tiff packages.

See Also

https://bugzilla.suse.com/1212535

https://bugzilla.suse.com/1212881

https://bugzilla.suse.com/1212883

https://bugzilla.suse.com/1212888

https://bugzilla.suse.com/1213273

https://bugzilla.suse.com/1213274

https://bugzilla.suse.com/1213589

https://bugzilla.suse.com/1213590

https://bugzilla.suse.com/1214574

http://www.nessus.org/u?3fdc180a

https://www.suse.com/security/cve/CVE-2020-18768

https://www.suse.com/security/cve/CVE-2023-25433

https://www.suse.com/security/cve/CVE-2023-26966

https://www.suse.com/security/cve/CVE-2023-2908

https://www.suse.com/security/cve/CVE-2023-3316

https://www.suse.com/security/cve/CVE-2023-3576

https://www.suse.com/security/cve/CVE-2023-3618

https://www.suse.com/security/cve/CVE-2023-38288

https://www.suse.com/security/cve/CVE-2023-38289

Plugin Details

Severity: Medium

ID: 184800

File Name: suse_SU-2023-4371-1.nasl

Version: 1.0

Type: local

Agent: unix

Published: 11/7/2023

Updated: 11/7/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-3618

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libtiff-devel, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:tiff, p-cpe:/a:novell:suse_linux:libtiff5, p-cpe:/a:novell:suse_linux:libtiff5-32bit

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/6/2023

Vulnerability Publication Date: 6/19/2023

Reference Information

CVE: CVE-2020-18768, CVE-2023-25433, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289

SuSE: SUSE-SU-2023:4371-1