First published: Tue Jun 07 2016(Updated: )
A vulnerability was found in libtiff. A maliciously crafted file could cause the application to crash via buffer overflow in gif2tiff tool. Upstream bug: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2552">http://bugzilla.maptools.org/show_bug.cgi?id=2552</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIFF | <=4.0.6 | |
debian/tiff | 4.2.0-1+deb11u5 4.2.0-1+deb11u6 4.5.0-6+deb12u2 4.5.0-6+deb12u1 4.7.0-3 | |
<=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5102 is classified as a medium severity vulnerability due to the potential for application crashes and exploitation via buffer overflow.
To fix CVE-2016-5102, update the libtiff package to a version that is not vulnerable, specifically versions 4.2.0-1+deb11u6 and later or 4.5.1+git230720-5.
CVE-2016-5102 affects the libtiff library and the gif2tiff tool within specific versions of the tiff package.
CVE-2016-5102 enables a buffer overflow attack that can lead to application crashes and potential remote code execution.
Currently, the best way to mitigate CVE-2016-5102 is to avoid processing untrusted TIFF files and upgrade the affected software.