First published: Tue Apr 11 2017(Updated: )
The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | <=4.0.6 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5322 is classified as a denial of service vulnerability due to an out-of-bounds read.
To fix CVE-2016-5322, update to libtiff version 4.1.0+git191117-2~deb10u4 or later.
LibTiff versions up to and including 4.0.6 are affected by CVE-2016-5322.
Yes, CVE-2016-5322 can be exploited by remote attackers through crafted TIFF images.
CVE-2016-5322 affects Debian Linux versions 8.0 and 9.0 that use vulnerable libtiff versions.