Debian Security Advisory

DLA-1206-1 tiff -- LTS security update

Date Reported:
13 Dec 2017
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 866109.
In Mitre's CVE dictionary: CVE-2017-9935.
More information:

In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.

This overflow is linked to an underlying assumption that all pages in a tiff document will have the same transfer function. There is nothing in the tiff standard that says this needs to be the case.

For Debian 7 Wheezy, these problems have been fixed in version 4.0.2-6+deb7u17.

We recommend that you upgrade your tiff packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: