First published: Tue Apr 12 2016(Updated: )
An out-of-bounds write flaw was found in libtiff v4.0.6 when using tiffcp command to handle malicious tiff file. The vulnerability exists in function horizontalDifference8() An attacker could control the head data of next heap which contains pre_size field and size filed to result in DoS or potential code execution. Vulnerable code: Source info ============ 1082 wp += n + stride - 1; /* point to last one */ 1083 ip += n + stride - 1; /* point to last one */ 1084 n -= stride; 1085 while (n > 0) { 1086 REPEAT(stride, wp[0] = CLAMP(ip[0]); 1087 wp[stride] -= wp[0]; 1088 wp[stride] &= mask; 1089 wp--; ip--) 1090 n -= stride; 1091 } 1092 REPEAT(stride, wp[0] = CLAMP(ip[0]); wp--; ip--) References: <a href="http://seclists.org/oss-sec/2016/q2/57">http://seclists.org/oss-sec/2016/q2/57</a> Upstream bug: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2544">http://bugzilla.maptools.org/show_bug.cgi?id=2544</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
Libtiff Libtiff | <=4.0.6 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.