First published: Mon Mar 21 2016(Updated: )
A buffer overflow vulnerability was reported in libtiff library, in gif2tiff component. A maliciously crafted file could cause the application to crash. Original bug report with reproducer: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - buffer overflow in gif2tiff" href="show_bug.cgi?id=1319503">https://bugzilla.redhat.com/show_bug.cgi?id=1319503</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
SUSE Linux | =13.2 | |
TIFF | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3186 has a high severity rating due to its potential to cause application crashes.
To fix CVE-2016-3186, upgrade to the patched versions of the libtiff library as specified in security advisories.
CVE-2016-3186 affects libtiff versions prior to the patches provided in versions such as 4.2.0-1+deb11u5 and 4.5.1+git230720-5.
CVE-2016-3186 involves the gif2tiff component of the libtiff library.
Yes, CVE-2016-3186 can potentially be exploited remotely by sending a maliciously crafted TIFF file to the affected application.