First published: Fri Jan 20 2017(Updated: )
The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
SUSE Linux | =13.1 | |
tiff | <=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5321 is classified as a denial of service vulnerability due to its potential to cause application crashes.
To resolve CVE-2016-5321, upgrade to a version of libtiff that is 4.1.0 or later, such as 4.1.0+git191117-2~deb10u4.
CVE-2016-5321 affects libtiff versions 4.0.6 and earlier.
Yes, CVE-2016-5321 can be exploited by an attacker using a crafted TIFF image to trigger the vulnerability.
CVE-2016-5321 impacts platforms using libtiff versions up to 4.0.6, including Debian and openSUSE.