First published: Wed Mar 01 2017(Updated: )
Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
TIFF | =4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10094 has a moderate severity rating due to the potential impacts stemming from an off-by-one error in image handling.
To fix CVE-2016-10094, upgrade to LibTIFF version 4.0.8 or later, or update the tiff package in Debian to a secure version.
CVE-2016-10094 affects LibTIFF version 4.0.7 and older versions of the tiff package in Debian.
CVE-2016-10094 could potentially allow remote attackers to execute arbitrary code through crafted image files.
No, CVE-2016-10094 is not present in LibTIFF versions 4.0.8 and later, which have addressed this vulnerability.