First published: Fri Jan 06 2017(Updated: )
An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5652 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-5652, update affected LibTIFF packages to the latest versions provided by your distribution.
CVE-2016-5652 enables attackers to execute arbitrary code on a system through a specially crafted TIFF image.
CVE-2016-5652 affects LibTIFF version 4.0.6 and earlier versions.
Yes, CVE-2016-5652 can be exploited by delivering a malicious TIFF file via email or other means.