#VU13373 Input validation error in LibTIFF

Published: 2018-06-16 | Updated: 2018-06-17

Vulnerability identifier: #VU13373

Vulnerability risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-10963


Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Universal components / Libraries / Libraries used by multiple products

Vendor: LibTIFF


The vulnerability allows a remote attacker to cause denial of service conditions.

The vulnerability exists due to insufficient validation of user-supplied input processed by the TIFFWriteDirectorySec() function, as defined in the tif_dirwrite.c source code file. A remote attacker can trick the victim into opening a specially crafted file, trigger assertion failure and cause the application to crash.

Install update from vendor's website.

Vulnerable software versions

LibTIFF: 4.0 - 4.0.9

External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

Latest bulletins with this vulnerability