Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-10688 — Improper Input Validation in Libtiff
Severity
7.5HIGHNVD
EPSS
6.8%
top 8.62%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 29
Latest updateMay 14
Description
In LibTIFF 4.0.8, there is a assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function in tif_dirwrite.c. A crafted input will lead to a remote denial of service attack.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
2💥Exploits & PoCs
1📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2017-10688 libtiff: Assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function↗2017-07-12
Bugzilla▶
CVE-2017-10688 CVE-2017-9935 CVE-2017-9936 CVE-2017-9937 mingw-libtiff: various flaws [epel-7]↗2017-07-11
Bugzilla▶
CVE-2017-10688 CVE-2017-9935 CVE-2017-9936 CVE-2017-9937 mingw-libtiff: various flaws [fedora-all]↗2017-07-11
Bugzilla▶
CVE-2017-10688 CVE-2017-9935 CVE-2017-9936 CVE-2017-9937 libtiff: various flaws [fedora-all]↗2017-07-11