SUSE update for tiff



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-25435
CVE-2023-52356
CWE-ID CWE-120
CWE-787
Exploitation vector Network
Public exploit N/A
Vulnerable software
SUSE Package Hub 15
Operating systems & Components / Operating system

Basesystem Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

libtiff-devel-64bit
Operating systems & Components / Operating system package or component

libtiff6-64bit
Operating systems & Components / Operating system package or component

libtiff6-64bit-debuginfo
Operating systems & Components / Operating system package or component

libtiff6-32bit
Operating systems & Components / Operating system package or component

libtiff-devel-32bit
Operating systems & Components / Operating system package or component

libtiff6-32bit-debuginfo
Operating systems & Components / Operating system package or component

libtiff-devel-docs
Operating systems & Components / Operating system package or component

tiff-docs
Operating systems & Components / Operating system package or component

libtiff-devel
Operating systems & Components / Operating system package or component

libtiff6-debuginfo
Operating systems & Components / Operating system package or component

libtiff6
Operating systems & Components / Operating system package or component

tiff-debuginfo
Operating systems & Components / Operating system package or component

tiff
Operating systems & Components / Operating system package or component

tiff-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU79329

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-25435

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to perform a denial of service attack.

The vulnerability exists due to buffer overflow in the extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753. A local unauthenticated attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.

Mitigation

Update the affected package tiff to the latest version.

Vulnerable software versions

SUSE Package Hub 15: 15-SP6

Basesystem Module: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

SUSE Linux Enterprise Desktop 15: SP6

libtiff-devel-64bit: before 4.7.0-150600.3.8.1

libtiff6-64bit: before 4.7.0-150600.3.8.1

libtiff6-64bit-debuginfo: before 4.7.0-150600.3.8.1

libtiff6-32bit: before 4.7.0-150600.3.8.1

libtiff-devel-32bit: before 4.7.0-150600.3.8.1

libtiff6-32bit-debuginfo: before 4.7.0-150600.3.8.1

libtiff-devel-docs: before 4.7.0-150600.3.8.1

tiff-docs: before 4.7.0-150600.3.8.1

libtiff-devel: before 4.7.0-150600.3.8.1

libtiff6-debuginfo: before 4.7.0-150600.3.8.1

libtiff6: before 4.7.0-150600.3.8.1

tiff-debuginfo: before 4.7.0-150600.3.8.1

tiff: before 4.7.0-150600.3.8.1

tiff-debugsource: before 4.7.0-150600.3.8.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250753-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU86755

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-52356

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the TIFFReadRGBATileExt() API. A remote attacker can pass a specially crafted TIFF file to the application, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected package tiff to the latest version.

Vulnerable software versions

SUSE Package Hub 15: 15-SP6

Basesystem Module: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

SUSE Linux Enterprise Desktop 15: SP6

libtiff-devel-64bit: before 4.7.0-150600.3.8.1

libtiff6-64bit: before 4.7.0-150600.3.8.1

libtiff6-64bit-debuginfo: before 4.7.0-150600.3.8.1

libtiff6-32bit: before 4.7.0-150600.3.8.1

libtiff-devel-32bit: before 4.7.0-150600.3.8.1

libtiff6-32bit-debuginfo: before 4.7.0-150600.3.8.1

libtiff-devel-docs: before 4.7.0-150600.3.8.1

tiff-docs: before 4.7.0-150600.3.8.1

libtiff-devel: before 4.7.0-150600.3.8.1

libtiff6-debuginfo: before 4.7.0-150600.3.8.1

libtiff6: before 4.7.0-150600.3.8.1

tiff-debuginfo: before 4.7.0-150600.3.8.1

tiff: before 4.7.0-150600.3.8.1

tiff-debugsource: before 4.7.0-150600.3.8.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250753-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###