SB2017112322 - Buffer overflow in tiff (Alpine package)
Published: November 23, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2017-16231)
The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=622c0975ca8f9a0441df23a7b943c7172993c082
- https://git.alpinelinux.org/aports/commit/?id=47b52e878e5d803ceb888a1404a311e19f30cb6e
- https://git.alpinelinux.org/aports/commit/?id=3bb6858aff988546af833aadbf73ab5abafc394f
- https://git.alpinelinux.org/aports/commit/?id=0b4aeeae39d8c4e7b2e383af2c5a4590fbaac5d8
- https://git.alpinelinux.org/aports/commit/?id=0cff3d3f5f3f43853528ce076c44db6d3493a33e
- https://git.alpinelinux.org/aports/commit/?id=62cf5b826847b3244ca96be46f33a14bd7422b3a
- https://git.alpinelinux.org/aports/commit/?id=a38ca99fc61c8dc3d9415dab827db85651df413c
- https://git.alpinelinux.org/aports/commit/?id=afcf5d53d3f4bbfa525b449faf8ccec32e32983d
- https://git.alpinelinux.org/aports/commit/?id=ed7168b963a5da887d32c26351c87f627a6147b2
- https://git.alpinelinux.org/aports/commit/?id=17f5b0b8cb4daab681a3b9c2aca7d363aaa53641
- https://git.alpinelinux.org/aports/commit/?id=6db06001eab088ffd4b195b0b537d2b4634b49f8
- https://git.alpinelinux.org/aports/commit/?id=713292e9b39017387f68cc813361e3da8a1d378b
- https://git.alpinelinux.org/aports/commit/?id=e9c43273f1af86175e73a28b12085cc76e1a7ea6