Risk | High |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2018-12900 CVE-2018-10963 CVE-2018-18661 CVE-2018-7456 CVE-2018-10779 CVE-2018-8905 CVE-2018-18557 CVE-2016-3186 CVE-2018-17100 CVE-2018-17101 CVE-2017-13726 CVE-2017-18013 |
CWE-ID | CWE-122 CWE-20 CWE-476 CWE-125 CWE-787 CWE-120 CWE-119 CWE-617 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #4 is available. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #7 is available. |
Vulnerable software Subscribe |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU16180
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-12900
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c. A remote unauthenticated attacker can trick the victim into opening a specially crafted TIFF file that can trigger memory corruption and cause the service to crash.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13373
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2018-10963
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause denial of service conditions.
The vulnerability exists due to insufficient validation of user-supplied input processed by the TIFFWriteDirectorySec() function, as defined in the tif_dirwrite.c source code file. A remote attacker can trick the victim into opening a specially crafted file, trigger assertion failure and cause the application to crash.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU15901
Risk: Low
CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-18661
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to NULL pointer dereference in the function LZWDecode in the file tif_lzw.c. A remote attacker can trick the victim into opening a specially crafted input, trigger NULL pointer dereference and cause the service to crash.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10792
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2018-7456
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
Description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.
The vulnerability exists in the TIFFPrintDirectory function that is defined in the tif_print.c source code file due to NULL pointer dereference. A remote attacker can create a specially crafted TIFF file, trick the victim into opening it and cause the service to crash.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU12422
Risk: Low
CVSSv3.1: 2.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:U]
CVE-ID: CVE-2018-10779
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in the TIFFWriteScanline function in the tif_write.csource code file due to insufficient validation of user-supplied input. A local attacker can use the .bmp2tiff command to execute a specially crafted file, trigger heap-based buffer over-read and cause the service to crash.
Mitigation
Update the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU11263
Risk: High
CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:U]
CVE-ID: CVE-2018-8905
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to cause DoS condition or execute arbitrary code on the target system.
The weakness exists in the LZWDecodeCompat function due to insufficient validation of user-supplied input. A remote attacker can submit a specially crafted TIFF file, cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Update the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU15967
Risk: High
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2018-18557
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to decoding of arbitrarily-sized JBIG into a buffer, ignoring the buffer size. A remote unauthenticated attacker can supply specially crafted input, trigger a tif_jbig.c JBIGDecode out-of-bounds write and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU11491
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-3186
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker can cause DoS condition on the target system.
The weakness exists in the gif2tiff.c due to buffer overflow. A remote attacker can submit a specially crafted GIF file and cause the service to crash.
Update the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15531
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17100
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to int32 overflow when insufficient validation of user-supplied input processed by the multiply_ms() function, as defined in the tools/ppm2tiff.c source code file. A remote unauthenticated attacker can trick the victim into opening or executing an image file that submits malicious input to the targeted system. A successful exploit could trigger memory corruption and cause the affected software to crash, resulting in a DoS condition.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15532
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17101
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to out-of-bounds read during insufficient validation of user-supplied input processed by the cpTags function, as defined in the tools/tiff2bw.c and tools/pal2rgb.c source code files. A remote unauthenticated attacker can trick the victim into opening or executing an image file that submits malicious input to the targeted system. A successful exploit could trigger memory corruption and cause the affected software to crash, resulting in a DoS condition.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13514
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-13726
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to a reachable assertion abort in the function TIFFWriteDirectorySec(), related to tif_dirwrite.c and a SubIFD tag when processing malicious input. A remote attacker can send specially crafted input, trigger assertion failure and cause the service to crash.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9820
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-18013
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference error in tif_print.c within TIFFPrintDirectory() function. A remote attacker can trigger a NULL pointer dereference error and crash the affected application.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
libtiff-4.0.3-32.34.amzn1.i686
libtiff-devel-4.0.3-32.34.amzn1.i686
libtiff-debuginfo-4.0.3-32.34.amzn1.i686
libtiff-static-4.0.3-32.34.amzn1.i686
src:
libtiff-4.0.3-32.34.amzn1.src
x86_64:
libtiff-static-4.0.3-32.34.amzn1.x86_64
libtiff-debuginfo-4.0.3-32.34.amzn1.x86_64
libtiff-4.0.3-32.34.amzn1.x86_64
libtiff-devel-4.0.3-32.34.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2019-1306.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.