Miggo Logo

CVE-2017-16232: ** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to...

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.81661%
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability CVE-2017-16232 alleges memory leaks in LibTIFF 4.0.8, specifically in tif_open.c, tif_lzw.c, and tif_aux.c. No commit patches (commit_infos) were provided for this analysis. However, an examination of the linked oss-security mailing list discussions, particularly the post from http://www.openwall.com/lists/oss-security/2017/11/01/3, provided an AddressSanitizer (ASAN) trace. This trace details memory allocations within specific LibTIFF library functions that were reported as leaked when a proof-of-concept file was processed using the tiff2bw tool.

The CVE is scoped to the LibTIFF library itself, not the tiff2bw tool. The ASAN trace directly implicates TIFFClientOpen (in tif_open.c), LZWSetupDecode (in tif_lzw.c), and memory utility functions _TIFFCheckRealloc and _TIFFCheckMalloc (in tif_aux.c) as the sources of these un-freed allocations. These functions would appear in a runtime profile during the memory allocation phase when the reported vulnerability is triggered.

The vulnerability's "DISPUTED" status, along with comments from a LibTIFF maintainer suggesting the issue might stem from the tiff2bw tool's memory management (or lack thereof, which is common for command-line utilities), makes definitive attribution complex without patches. However, the ASAN logs offer the most direct evidence available, pointing to these library functions as the allocators of the leaked memory. The confidence for these functions is marked as "medium" due to the disputed nature and the absence of commit patches, but the ASAN trace provides a strong indication of which library functions are involved in the reported memory consumption.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

** *ISPUT** ** Li*TI** *.*.* **s multipl* m*mory l**k vuln*r**iliti*s, w*i** *llow *tt**k*rs to **us* * **ni*l o* s*rvi** (m*mory *onsumption), *s **monstr*t** *y ti*_op*n.*, ti*_lzw.*, *n* ti*_*ux.*. NOT*: T*ir* p*rti*s w*r* un**l* to r*pro*u** t**

Reasoning

T** vuln*r**ility *V*-****-***** *ll***s m*mory l**ks in Li*TI** *.*.*, sp**i*i**lly in `ti*_op*n.*`, `ti*_lzw.*`, *n* `ti*_*ux.*`. No *ommit p*t***s (*ommit_in*os) w*r* provi*** *or t*is *n*lysis. *ow*v*r, *n *x*min*tion o* t** link** oss-s**urity m