First published: Wed Jan 18 2017(Updated: )
tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9273 is classified as a denial of service vulnerability due to out-of-bounds read in libtiff.
To mitigate CVE-2016-9273, update to a version of libtiff that is 4.1.0+git191117-2~deb10u4 or later.
CVE-2016-9273 affects libtiff version 4.0.6 specifically.
Yes, CVE-2016-9273 can be exploited remotely via a crafted TIFF file.
CVE-2016-9273 is particularly reported in Debian's libtiff package.