Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3619 (GCVE-0-2016-3619)
Vulnerability from cvelistv5 – Published: 2016-10-03 16:00 – Updated: 2024-08-06 00:03- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:03:34.265Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/85919"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-04-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-02T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1035508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/85919"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85919"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-3619",
"datePublished": "2016-10-03T16:00:00",
"dateReserved": "2016-03-21T00:00:00",
"dateUpdated": "2024-08-06T00:03:34.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33708995-494C-476D-B0E3-1E78B9328699\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \\\"-c none\\\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n DumpModeEncode en tif_dumpmode.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\\u00f3n \\\"-c none\\\" es usada, permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (sobre lectura del b\\u00fafer) a trav\\u00e9s de una imagen BMP manipulada.\"}]",
"id": "CVE-2016-3619",
"lastModified": "2024-11-21T02:50:23.963",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2016-10-03T16:09:00.180",
"references": "[{\"url\": \"http://bugzilla.maptools.org/show_bug.cgi?id=2567\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/04/07/1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/85919\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id/1035508\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-16\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugzilla.maptools.org/show_bug.cgi?id=2567\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/04/07/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/85919\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1035508\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-3619\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-10-03T16:09:00.180\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \\\"-c none\\\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n DumpModeEncode en tif_dumpmode.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \\\"-c none\\\" es usada, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (sobre lectura del b\u00fafer) a trav\u00e9s de una imagen BMP manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33708995-494C-476D-B0E3-1E78B9328699\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2567\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/85919\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/04/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/85919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
SUSE-SU-2018:3879-1
Vulnerability from csaf_suse - Published: 2018-11-23 16:06 - Updated: 2018-11-23 16:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).\n- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).\n- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). \n- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).\n- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).\n- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).\n- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).\n- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).\n- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)\n- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)\n- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).\n\nNon-security issues fixed:\n\n- asan_build: build ASAN included\n- debug_build: build more suitable for debugging\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-tiff-13878,slessp4-tiff-13878",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3879-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3879-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183879-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3879-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html"
},
{
"category": "self",
"summary": "SUSE Bug 1010163",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "self",
"summary": "SUSE Bug 1014461",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "self",
"summary": "SUSE Bug 1040080",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "self",
"summary": "SUSE Bug 1040322",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "self",
"summary": "SUSE Bug 1074186",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "self",
"summary": "SUSE Bug 1099257",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "self",
"summary": "SUSE Bug 1113672",
"url": "https://bugzilla.suse.com/1113672"
},
{
"category": "self",
"summary": "SUSE Bug 974446",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "self",
"summary": "SUSE Bug 974447",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "self",
"summary": "SUSE Bug 974448",
"url": "https://bugzilla.suse.com/974448"
},
{
"category": "self",
"summary": "SUSE Bug 983440",
"url": "https://bugzilla.suse.com/983440"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8870 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5319 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9273 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9273/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17942 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9117 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9147 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12900 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18661 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18661/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2018-11-23T16:06:18Z",
"generator": {
"date": "2018-11-23T16:06:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3879-1",
"initial_release_date": "2018-11-23T16:06:18Z",
"revision_history": [
{
"date": "2018-11-23T16:06:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.i586",
"product_id": "libtiff3-3.8.2-141.169.22.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.i586",
"product": {
"name": "tiff-3.8.2-141.169.22.1.i586",
"product_id": "tiff-3.8.2-141.169.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"product_id": "libtiff3-x86-3.8.2-141.169.22.1.ia64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ia64",
"product_id": "tiff-3.8.2-141.169.22.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.ppc64",
"product_id": "tiff-3.8.2-141.169.22.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product": {
"name": "tiff-3.8.2-141.169.22.1.s390x",
"product_id": "tiff-3.8.2-141.169.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"product_id": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product": {
"name": "tiff-3.8.2-141.169.22.1.x86_64",
"product_id": "tiff-3.8.2-141.169.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff3-x86-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64"
},
"product_reference": "libtiff3-x86-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586"
},
"product_reference": "tiff-3.8.2-141.169.22.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x"
},
"product_reference": "tiff-3.8.2-141.169.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-3.8.2-141.169.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64"
},
"product_reference": "tiff-3.8.2-141.169.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-8870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8870"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8870",
"url": "https://www.suse.com/security/cve/CVE-2015-8870"
},
{
"category": "external",
"summary": "SUSE Bug 1014461 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1014461"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2015-8870",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2015-8870"
},
{
"cve": "CVE-2016-3619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3619"
}
],
"notes": [
{
"category": "general",
"text": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3619",
"url": "https://www.suse.com/security/cve/CVE-2016-3619"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974446 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974446"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974447"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3619",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3619"
},
{
"cve": "CVE-2016-3620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3620"
}
],
"notes": [
{
"category": "general",
"text": "The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c zip\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3620",
"url": "https://www.suse.com/security/cve/CVE-2016-3620"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974447 for CVE-2016-3620",
"url": "https://bugzilla.suse.com/974447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3620"
},
{
"cve": "CVE-2016-3621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3621"
}
],
"notes": [
{
"category": "general",
"text": "The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c lzw\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3621",
"url": "https://www.suse.com/security/cve/CVE-2016-3621"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 974448 for CVE-2016-3621",
"url": "https://bugzilla.suse.com/974448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2016-3621"
},
{
"cve": "CVE-2016-5319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5319"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5319",
"url": "https://www.suse.com/security/cve/CVE-2016-5319"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2016-5319",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-5319"
},
{
"cve": "CVE-2016-9273",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9273"
}
],
"notes": [
{
"category": "general",
"text": "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9273",
"url": "https://www.suse.com/security/cve/CVE-2016-9273"
},
{
"category": "external",
"summary": "SUSE Bug 1010163 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1010163"
},
{
"category": "external",
"summary": "SUSE Bug 1017693 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1017693"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2016-9273",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-9273"
},
{
"cve": "CVE-2017-17942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17942"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17942",
"url": "https://www.suse.com/security/cve/CVE-2017-17942"
},
{
"category": "external",
"summary": "SUSE Bug 1074186 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1074186"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/1150480"
},
{
"category": "external",
"summary": "SUSE Bug 983440 for CVE-2017-17942",
"url": "https://bugzilla.suse.com/983440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-17942"
},
{
"cve": "CVE-2017-9117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9117"
}
],
"notes": [
{
"category": "general",
"text": "In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9117",
"url": "https://www.suse.com/security/cve/CVE-2017-9117"
},
{
"category": "external",
"summary": "SUSE Bug 1040080 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1040080"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9117",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9117"
},
{
"cve": "CVE-2017-9147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9147"
}
],
"notes": [
{
"category": "general",
"text": "LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9147",
"url": "https://www.suse.com/security/cve/CVE-2017-9147"
},
{
"category": "external",
"summary": "SUSE Bug 1040322 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1040322"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2017-9147",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-9147"
},
{
"cve": "CVE-2018-12900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12900"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12900",
"url": "https://www.suse.com/security/cve/CVE-2018-12900"
},
{
"category": "external",
"summary": "SUSE Bug 1099257 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1099257"
},
{
"category": "external",
"summary": "SUSE Bug 1125113 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1125113"
},
{
"category": "external",
"summary": "SUSE Bug 1150480 for CVE-2018-12900",
"url": "https://bugzilla.suse.com/1150480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-12900"
},
{
"cve": "CVE-2018-18661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18661"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18661",
"url": "https://www.suse.com/security/cve/CVE-2018-18661"
},
{
"category": "external",
"summary": "SUSE Bug 1113672 for CVE-2018-18661",
"url": "https://bugzilla.suse.com/1113672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-11-23T16:06:18Z",
"details": "low"
}
],
"title": "CVE-2018-18661"
}
]
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
GHSA-QWFP-646H-7PM7
Vulnerability from github – Published: 2022-05-17 01:18 – Updated: 2022-05-17 01:18The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c none" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
{
"affected": [],
"aliases": [
"CVE-2016-3619"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-10-03T16:09:00Z",
"severity": "MODERATE"
},
"details": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GHSA-qwfp-646h-7pm7",
"modified": "2022-05-17T01:18:14Z",
"published": "2022-05-17T01:18:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3619"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"type": "WEB",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1035508"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2016-02093
Vulnerability from cnvd - Published: 2016-04-11用户可参考如下厂商提供的安全补丁以修复该漏洞: http://www.libtiff.org/
| Name | Silicon Graphics, Inc. LibTiff <=4.0.6 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-3619"
}
},
"description": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684\u2018DumpModeEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "Mei Wang of the Cloud Security Team, Qihoo 360",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.libtiff.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-02093",
"openTime": "2016-04-11",
"patchDescription": "Silicon Graphics LibTiff\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nSilicon Graphics LibTiff\u7684bmp2tiff\u5de5\u5177\u4e2d\u7684\u2018DumpModeEncode\u2019\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u5e26\u6709\u2018-c lzw\u2019\u53c2\u6570\u7684bmp\u56fe\u50cf\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Silicon Graphics, Inc. LibTiff \u003c=4.0.6"
},
"referenceLink": "http://www.openwall.com/lists/oss-security/2016/04/07/1",
"serverity": "\u4e2d",
"submitTime": "2016-04-09",
"title": "Silicon Graphics LibTiff bmp2tiff\u5de5\u5177\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
GSD-2016-3619
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-3619",
"description": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3619",
"references": [
"https://www.suse.com/security/cve/CVE-2016-3619.html",
"https://security.archlinux.org/CVE-2016-3619"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-3619"
],
"details": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.",
"id": "GSD-2016-3619",
"modified": "2023-12-13T01:21:28.174761Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85919"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3619"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20160407 CVE-2016-3619 libtiff: Out-of-bounds Read in the bmp2tiff tool",
"refsource": "MLIST",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2567",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"name": "85919",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/85919"
},
{
"name": "GLSA-201701-16",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"name": "1035508",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1035508"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2017-09-03T01:29Z",
"publishedDate": "2016-10-03T16:09Z"
}
}
}
FKIE_CVE-2016-3619
Vulnerability from fkie_nvd - Published: 2016-10-03 16:09 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "33708995-494C-476D-B0E3-1E78B9328699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the \"-c none\" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image."
},
{
"lang": "es",
"value": "La funci\u00f3n DumpModeEncode en tif_dumpmode.c en la herramienta bmp2tiff en LibTIFF 4.0.6 y versiones anteriores, cuando la opci\u00f3n \"-c none\" es usada, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (sobre lectura del b\u00fafer) a trav\u00e9s de una imagen BMP manipulada."
}
],
"id": "CVE-2016-3619",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-10-03T16:09:00.180",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201701-16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/04/07/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/85919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1035508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201701-16"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.