In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1391-1 | tiff security update |
Debian DLA |
DLA-1411-1 | tiff security update |
Debian DSA |
DSA-4349-1 | tiff security update |
EUVD |
EUVD-2018-17551 | In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries. |
Ubuntu USN |
USN-3602-1 | LibTIFF vulnerabilities |
Ubuntu USN |
USN-3606-1 | LibTIFF vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:47:54.574Z
Reserved: 2018-01-19T00:00:00.000Z
Link: CVE-2018-5784
No data.
Status : Modified
Published: 2018-01-19T08:29:00.320
Modified: 2024-11-21T04:09:23.417
Link: CVE-2018-5784
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN