First published: Fri Apr 08 2016(Updated: )
Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
libtiff | <=4.0.6 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3945 is considered to have a high severity due to its potential to cause a denial of service or execute arbitrary code.
To fix CVE-2016-3945, upgrade LibTIFF to version 4.1.0 or later that is not vulnerable.
LibTIFF versions 4.0.6 and earlier are affected by CVE-2016-3945.
Yes, CVE-2016-3945 can potentially lead to data breaches if exploited by attackers to execute arbitrary code.
There are no effective workarounds for CVE-2016-3945; the recommended action is to update to a patched version.