Description
In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1391-1 | tiff security update |
Debian DLA |
DLA-1411-1 | tiff security update |
Debian DSA |
DSA-4349-1 | tiff security update |
EUVD |
EUVD-2018-17551 | In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries. |
Ubuntu USN |
USN-3602-1 | LibTIFF vulnerabilities |
Ubuntu USN |
USN-3606-1 | LibTIFF vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:47:54.574Z
Reserved: 2018-01-19T00:00:00.000Z
Link: CVE-2018-5784
No data.
Status : Modified
Published: 2018-01-19T08:29:00.320
Modified: 2024-11-21T04:09:23.417
Link: CVE-2018-5784
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN