CVE编号
CVE-2019-17546利用情况
暂无补丁情况
官方补丁披露时间
2019-10-14漏洞描述
在LibTIFF到4.0.10的tif_getimage.c中,就像在GDAL到3.0.1和其他产品中使用的一样,有一个整数溢出,它可能通过一个与“负大小参数”条件相关的手工RGBA映像导致基于堆的缓冲区溢出。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
参考链接 |
|
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443 | |
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf | |
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145 | |
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00020.html | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://seclists.org/bugtraq/2020/Jan/32 | |
https://security.gentoo.org/glsa/202003-25 | |
https://www.debian.org/security/2020/dsa-4608 | |
https://www.debian.org/security/2020/dsa-4670 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | libtiff | libtiff | * |
Up to (excluding) 4.1.0 |
|||||
运行在以下环境 | |||||||||
应用 | osgeo | gdal | * |
Up to (including) 3.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | gdal | * |
Up to (excluding) 4.0.3-35.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | gdal | * |
Up to (excluding) 4.0.3-35.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | gdal | * |
Up to (excluding) 4.0.3-35.36.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | tiff | * |
Up to (excluding) 4.0.9-18.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | gdal | * |
Up to (excluding) 2.4.0+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | gdal | * |
Up to (excluding) 3.2.2+dfsg-2+deb11u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_12 | tiff | * |
Up to (excluding) 3.4.2+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | gdal | * |
Up to (excluding) 1.10.1+dfsg-8+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | gdal | * |
Up to (excluding) 2.1.2+dfsg-5 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | gdal | * |
Up to (excluding) 3.4.2+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | gdal | * |
Up to (excluding) 4.0.10-8.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | gdal | * |
Up to (excluding) 4.0.10-8.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | tiff | * |
Up to (excluding) 4.0.9-45.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | tiff | * |
Up to (excluding) 4.0.9-45.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | gdal | * |
Up to (excluding) 4.0.3-35.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | gdal | * |
Up to (excluding) 4.0.9-18.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | tiff | * |
Up to (excluding) 4.0.9-18.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | tiff | * |
Up to (excluding) 4.0.9-44.45.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | tiff | * |
Up to (excluding) 4.0.6-1ubuntu0.7 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | tiff | * |
Up to (excluding) 4.0.9-5ubuntu0.3 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...