<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tiff</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:1826-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-06-27T10:45:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-06-27T10:45:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-06-27T10:45:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tiff</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tiff fixes the following issues:

These security issues were fixed:

- CVE-2017-18013: There was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2018-10963: The TIFFWriteDirectorySec() function in tif_dirwrite.c allowed remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.  (bsc#1092949)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of TIFF images. A crafted TIFF document could have lead to a type confusion vulnerability resulting in remote code execution. This vulnerability could have been be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality (bsc#1007276)
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image (bsc#974621)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP3-2018-1233,SUSE-SLE-SDK-12-SP3-2018-1233,SUSE-SLE-SERVER-12-SP3-2018-1233</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      <Description>Link for SUSE-SU-2018:1826-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:1826-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007276</URL>
      <Description>SUSE Bug 1007276</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1074317</URL>
      <Description>SUSE Bug 1074317</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082332</URL>
      <Description>SUSE Bug 1082332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082825</URL>
      <Description>SUSE Bug 1082825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1086408</URL>
      <Description>SUSE Bug 1086408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1092949</URL>
      <Description>SUSE Bug 1092949</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/974621</URL>
      <Description>SUSE Bug 974621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3632/</URL>
      <Description>SUSE CVE CVE-2016-3632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8331/</URL>
      <Description>SUSE CVE CVE-2016-8331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11613/</URL>
      <Description>SUSE CVE CVE-2017-11613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13726/</URL>
      <Description>SUSE CVE CVE-2017-13726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18013/</URL>
      <Description>SUSE CVE CVE-2017-18013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10963/</URL>
      <Description>SUSE CVE CVE-2018-10963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7456/</URL>
      <Description>SUSE CVE CVE-2018-7456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8905/</URL>
      <Description>SUSE CVE CVE-2018-8905 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP3" CPE="cpe:/o:suse:sled:12:sp3">SUSE Linux Enterprise Desktop 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3" CPE="cpe:/o:suse:sles:12:sp3">SUSE Linux Enterprise Server 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3" CPE="cpe:/o:suse:sles_sap:12:sp3">SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3" CPE="cpe:/o:suse:sle-sdk:12:sp3">SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.0.9-44.15.2">
      <FullProductName ProductID="libtiff5-4.0.9-44.15.2">libtiff5-4.0.9-44.15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.0.9-44.15.2">
      <FullProductName ProductID="libtiff5-32bit-4.0.9-44.15.2">libtiff5-32bit-4.0.9-44.15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.0.9-44.15.2">
      <FullProductName ProductID="libtiff-devel-4.0.9-44.15.2">libtiff-devel-4.0.9-44.15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.0.9-44.15.2">
      <FullProductName ProductID="tiff-4.0.9-44.15.2">tiff-4.0.9-44.15.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff5-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2">libtiff5-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Desktop 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2">libtiff5-32bit-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Desktop 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2">libtiff5-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2">libtiff5-32bit-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2">tiff-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2">libtiff5-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2">libtiff5-32bit-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2">tiff-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-4.0.9-44.15.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2">libtiff-devel-4.0.9-44.15.2 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2016-3632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3632.html</URL>
        <Description>CVE-2016-3632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974621</URL>
        <Description>SUSE Bug 974621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.</Note>
    </Notes>
    <CVE>CVE-2016-8331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8331.html</URL>
        <Description>CVE-2016-8331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.</Note>
    </Notes>
    <CVE>CVE-2017-11613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11613.html</URL>
        <Description>CVE-2017-11613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082332</URL>
        <Description>SUSE Bug 1082332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106853</URL>
        <Description>SUSE Bug 1106853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.</Note>
    </Notes>
    <CVE>CVE-2017-13726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13726.html</URL>
        <Description>CVE-2017-13726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056176</URL>
        <Description>SUSE Bug 1056176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092949</URL>
        <Description>SUSE Bug 1092949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.</Note>
    </Notes>
    <CVE>CVE-2017-18013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18013.html</URL>
        <Description>CVE-2017-18013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.</Note>
    </Notes>
    <CVE>CVE-2018-10963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10963.html</URL>
        <Description>CVE-2018-10963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092949</URL>
        <Description>SUSE Bug 1092949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)</Note>
    </Notes>
    <CVE>CVE-2018-7456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7456.html</URL>
        <Description>CVE-2018-7456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.</Note>
    </Notes>
    <CVE>CVE-2018-8905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-32bit-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:libtiff5-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:tiff-4.0.9-44.15.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libtiff-devel-4.0.9-44.15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8905.html</URL>
        <Description>CVE-2018-8905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086408</URL>
        <Description>SUSE Bug 1086408</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
