<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tiff</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3035-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-07T10:50:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-07T10:50:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-07T10:50:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tiff</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
Tiff was updated to version 4.0.7. This update fixes the following issues:

  * libtiff/tif_aux.c
    + Fix crash in TIFFVGetFieldDefaulted() when requesting
      Predictor tag and that the zip/lzw codec is not configured.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2591)
  * libtiff/tif_compress.c
    + Make TIFFNoDecode() return 0 to indicate an error and make
      upper level read routines treat it accordingly.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2517)
  * libtiff/tif_dir.c
    + Discard values of SMinSampleValue and SMaxSampleValue when
      they have been read and the value of SamplesPerPixel is
      changed afterwards (like when reading a OJPEG compressed image
      with a missing SamplesPerPixel tag, and whose photometric is
      RGB or YCbCr, forcing SamplesPerPixel being 3). Otherwise when
      rewriting the directory (for example with tiffset, we will
      expect 3 values whereas the array had been allocated with just
      one), thus causing a out of bound read access.
      (CVE-2014-8127, boo#914890, duplicate: CVE-2016-3658, boo#974840)
  * libtiff/tif_dirread.c
    + In TIFFFetchNormalTag(), do not dereference NULL pointer when
      values of tags with TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII
      access are 0-byte arrays.
      (CVE-2016-9448, boo#1011103)
    + In TIFFFetchNormalTag(), make sure that values of tags with
      TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII access are null
      terminated, to avoid potential read outside buffer in
      _TIFFPrintField().
      (CVE-2016-9297, boo#1010161)
    + Prevent reading ColorMap or TransferFunction if
      BitsPerPixel &amp;gt; 24, so as to avoid huge memory allocation and
      file read attempts
    + Reject images with OJPEG compression that have no
      TileOffsets/StripOffsets tag, when OJPEG compression is
      disabled. Prevent null pointer dereference in
      TIFFReadRawStrip1() and other functions that expect
      td_stripbytecount to be non NULL.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2585)
    + When compiled with DEFER_STRILE_LOAD, fix regression, when
      reading a one-strip file without a StripByteCounts tag.
    + Workaround false positive warning of Clang Static Analyzer
      about null pointer dereference in TIFFCheckDirOffset().
  * libtiff/tif_dirwrite.c
    + Avoid null pointer dereference on td_stripoffset when writing
      directory, if FIELD_STRIPOFFSETS was artificially set for a
      hack case in OJPEG case. Fixes
      (CVE-2014-8127, boo#914890, duplicate: CVE-2016-3658,
      boo#974840)
    + Fix truncation to 32 bit of file offsets in TIFFLinkDirectory()
      and TIFFWriteDirectorySec() when aligning directory offsets on
      an even offset (affects BigTIFF).
  * libtiff/tif_dumpmode.c
    + DumpModeEncode() should return 0 in case of failure so that
      the above mentionned functions detect the error.
  * libtiff/tif_fax3.c
    + remove dead assignment in Fax3PutEOLgdal().
  * libtiff/tif_fax3.h
    + make Param member of TIFFFaxTabEnt structure a uint16 to
      reduce size of the binary.
  * libtiff/tif_getimage.c
    + Fix out-of-bound reads in TIFFRGBAImage interface in case of
      unsupported values of SamplesPerPixel/ExtraSamples for
      LogLUV/CIELab. Add explicit call to TIFFRGBAImageOK() in
      TIFFRGBAImageBegin(). Fix CVE-2015-8665 and CVE-2015-8683.
    + TIFFRGBAImageOK: Reject attempts to read floating point images.
  * libtiff/tif_luv.c
    + Fix potential out-of-bound writes in decode functions in non
      debug builds by replacing assert()s by regular if checks
      (http://bugzilla.maptools.org/show_bug.cgi?id=2522). Fix
      potential out-of-bound reads in case of short input data.
    + Validate that for COMPRESSION_SGILOG and PHOTOMETRIC_LOGL,
      there is only one sample per pixel. Avoid potential invalid
      memory write on corrupted/unexpected images when using the
      TIFFRGBAImageBegin() interface
  * libtiff/tif_next.c
    + Fix potential out-of-bound write in NeXTDecode()
    (http://bugzilla.maptools.org/show_bug.cgi?id=2508)
  * libtiff/tif_pixarlog.c
    + Avoid zlib error messages to pass a NULL string to %s
      formatter, which is undefined behaviour in sprintf().
    + Fix out-of-bounds write vulnerabilities in heap allocated
      buffers. Reported as MSVR 35094.
    + Fix potential buffer write overrun in PixarLogDecode() on
      corrupted/unexpected images (CVE-2016-5875, boo#987351)
  * libtiff/tif_predict.c
    + PredictorSetup: Enforce bits-per-sample requirements of
      floating point predictor (3).
      (CVE-2016-3622, boo#974449)
  * libtiff/tif_predict.h, libtiff/tif_predict.c
    + Replace assertions by runtime checks to avoid assertions in
      debug mode, or buffer overflows in release mode. Can happen
      when dealing with unusual tile size like YCbCr with
      subsampling. Reported as MSVR 35105.
  * libtiff/tif_read.c
    + Fix out-of-bounds read on memory-mapped files in
      TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset
      is beyond tmsize_t max value
    + Make TIFFReadEncodedStrip() and TIFFReadEncodedTile() directly
      use user provided buffer when no compression (and other
      conditions) to save a memcpy().
  * libtiff/tif_strip.c
    + Make TIFFNumberOfStrips() return the td-&amp;gt;td_nstrips value when
      it is non-zero, instead of recomputing it. This is needed in
      TIFF_STRIPCHOP mode where td_nstrips is modified. Fixes a read
      outsize of array in tiffsplit (or other utilities using
      TIFFNumberOfStrips()).
      (CVE-2016-9273, boo#1010163)
  * libtiff/tif_write.c
    + Fix issue in error code path of TIFFFlushData1() that didn't
      reset the tif_rawcc and tif_rawcp members. I'm not completely
      sure if that could happen in practice outside of the odd
      behaviour of t2p_seekproc() of tiff2pdf). The report points
      that a better fix could be to check the return value of
      TIFFFlushData1() in places where it isn't done currently, but
      it seems this patch is enough. Reported as MSVR 35095.
    + Make TIFFWriteEncodedStrip() and TIFFWriteEncodedTile()
      directly use user provided buffer when no compression to save
      a memcpy().
    + TIFFWriteEncodedStrip() and TIFFWriteEncodedTile() should
      return -1 in case of failure of tif_encodestrip() as documented
  * tools/fax2tiff.c
    + Fix segfault when specifying -r without argument.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2572)
  * tools/Makefile.am
    + The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff,
      sgisv, and ycbcr are completely removed from the distribution.
      The libtiff tools rgb2ycbcr and thumbnail are only built in
      the build tree for testing. Old files are put in new 'archive'
      subdirectory of the source repository, but not in
      distribution archives. These changes are made in order to
      lessen the maintenance burden.
  * tools/tiff2bw.c
    + Fix weight computation that could result of color value
      overflow (no security implication). Fix
      http://bugzilla.maptools.org/show_bug.cgi?id=2550.
  * tools/tiff2pdf.c
    + Avoid undefined behaviour related to overlapping of source and
      destination buffer in memcpy() call in
      t2p_sample_rgbaa_to_rgb()
      (http://bugzilla.maptools.org/show_bug.cgi?id=2577)
    + Fix out-of-bounds write vulnerabilities in heap allocate buffer
      in t2p_process_jpeg_strip(). Reported as MSVR 35098.
    + Fix potential integer overflows on 32 bit builds in
      t2p_read_tiff_size()
      (http://bugzilla.maptools.org/show_bug.cgi?id=2576)
    + Fix read -largely- outsize of buffer in
      t2p_readwrite_pdf_image_tile(), causing crash, when reading a
      JPEG compressed image with TIFFTAG_JPEGTABLES length being one.
      (CVE-2016-9453, boo#1011107)
    + Fix write buffer overflow of 2 bytes on JPEG compressed images.
      Also prevents writing 2 extra uninitialized bytes to the file
      stream.
      (TALOS-CAN-0187, CVE-2016-5652, boo#1007280)
  * tools/tiffcp.c
    + Fix out-of-bounds write on tiled images with odd tile width vs
      image width. Reported as MSVR 35103.
    + Fix read of undefined variable in case of missing required
      tags. Found on test case of MSVR 35100.
  * tools/tiffcrop.c
    + Avoid access outside of stack allocated array on a tiled
      separate TIFF with more than 8 samples per pixel.
      (CVE-2016-5321, CVE-2016-5323, boo#984813, boo#984815)
    + Fix memory leak in (recent) error code path.
    + Fix multiple uint32 overflows in writeBufferToSeparateStrips(),
      writeBufferToContigTiles() and writeBufferToSeparateTiles()
      that could cause heap buffer overflows.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2592)
    + Fix out-of-bound read of up to 3 bytes in
      readContigTilesIntoBuffer(). Reported as MSVR 35092.
    + Fix read of undefined buffer in readContigStripsIntoBuffer()
      due to uint16 overflow. Reported as MSVR 35100.
    + Fix various out-of-bounds write vulnerabilities in heap or
      stack allocated buffers. Reported as MSVR 35093, MSVR 35096
      and MSVR 35097.
    + readContigTilesIntoBuffer: Fix signed/unsigned comparison
      warning.
  * tools/tiffdump.c
    + Fix a few misaligned 64-bit reads warned by -fsanitize
    + ReadDirectory: Remove uint32 cast to_TIFFmalloc() argument
      which resulted in Coverity report. Added more mutiplication
      overflow checks
  * tools/tiffinfo.c
    + Fix out-of-bound read on some tiled images.
      (http://bugzilla.maptools.org/show_bug.cgi?id=2517)
    + TIFFReadContigTileData: Fix signed/unsigned comparison warning.
    + TIFFReadSeparateTileData: Fix signed/unsigned comparison
      warning.
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3035-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff-devel-4.0.7-10.35.1">libtiff-devel-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff-devel-32bit-4.0.7-10.35.1">libtiff-devel-32bit-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff5-4.0.7-10.35.1">libtiff5-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff5-32bit-4.0.7-10.35.1">libtiff5-32bit-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-debuginfo-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff5-debuginfo-4.0.7-10.35.1">libtiff5-debuginfo-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-debuginfo-32bit-4.0.7-10.35.1">
      <FullProductName ProductID="libtiff5-debuginfo-32bit-4.0.7-10.35.1">libtiff5-debuginfo-32bit-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.0.7-10.35.1">
      <FullProductName ProductID="tiff-4.0.7-10.35.1">tiff-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-debuginfo-4.0.7-10.35.1">
      <FullProductName ProductID="tiff-debuginfo-4.0.7-10.35.1">tiff-debuginfo-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-debugsource-4.0.7-10.35.1">
      <FullProductName ProductID="tiff-debugsource-4.0.7-10.35.1">tiff-debugsource-4.0.7-10.35.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff-devel-4.0.7-10.35.1">libtiff-devel-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1">libtiff-devel-32bit-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff5-4.0.7-10.35.1">libtiff5-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1">libtiff5-32bit-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-debuginfo-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1">libtiff5-debuginfo-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-debuginfo-32bit-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1">libtiff5-debuginfo-32bit-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:tiff-4.0.7-10.35.1">tiff-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-debuginfo-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1">tiff-debuginfo-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-debugsource-4.0.7-10.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1">tiff-debugsource-4.0.7-10.35.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.</Note>
    </Notes>
    <CVE>CVE-2014-8127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8127.html</URL>
        <Description>CVE-2014-8127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942690</URL>
        <Description>SUSE Bug 942690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-7554</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7554.html</URL>
        <Description>CVE-2015-7554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960341</URL>
        <Description>SUSE Bug 960341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-8665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8665.html</URL>
        <Description>CVE-2015-8665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-8683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8683.html</URL>
        <Description>CVE-2015-8683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2016-3622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3622.html</URL>
        <Description>CVE-2016-3622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974449</URL>
        <Description>SUSE Bug 974449</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.</Note>
    </Notes>
    <CVE>CVE-2016-3658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3658.html</URL>
        <Description>CVE-2016-3658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974840</URL>
        <Description>SUSE Bug 974840</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.</Note>
    </Notes>
    <CVE>CVE-2016-5321</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5321.html</URL>
        <Description>CVE-2016-5321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984813</URL>
        <Description>SUSE Bug 984813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.</Note>
    </Notes>
    <CVE>CVE-2016-5323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5323.html</URL>
        <Description>CVE-2016-5323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984815</URL>
        <Description>SUSE Bug 984815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.</Note>
    </Notes>
    <CVE>CVE-2016-5652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5652.html</URL>
        <Description>CVE-2016-5652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007280</URL>
        <Description>SUSE Bug 1007280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2016-5875</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.7</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5875.html</URL>
        <Description>CVE-2016-5875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007284</URL>
        <Description>SUSE Bug 1007284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984831</URL>
        <Description>SUSE Bug 984831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987351</URL>
        <Description>SUSE Bug 987351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.</Note>
    </Notes>
    <CVE>CVE-2016-9273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9273.html</URL>
        <Description>CVE-2016-9273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010163</URL>
        <Description>SUSE Bug 1010163</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.</Note>
    </Notes>
    <CVE>CVE-2016-9297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9297.html</URL>
        <Description>CVE-2016-9297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010161</URL>
        <Description>SUSE Bug 1010161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011103</URL>
        <Description>SUSE Bug 1011103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.</Note>
    </Notes>
    <CVE>CVE-2016-9448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9448.html</URL>
        <Description>CVE-2016-9448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010161</URL>
        <Description>SUSE Bug 1010161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011103</URL>
        <Description>SUSE Bug 1011103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.</Note>
    </Notes>
    <CVE>CVE-2016-9453</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libtiff-devel-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff-devel-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-32bit-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:libtiff5-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debuginfo-4.0.7-10.35.1</ProductID>
        <ProductID>openSUSE 13.2:tiff-debugsource-4.0.7-10.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9453.html</URL>
        <Description>CVE-2016-9453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011107</URL>
        <Description>SUSE Bug 1011107</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
