First published: Wed Jan 18 2017(Updated: )
The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9297 has a severity level that can lead to denial of service due to out-of-bounds read.
To fix CVE-2016-9297, upgrade to LibTiff version 4.1.0 or later.
CVE-2016-9297 affects LibTiff version 4.0.6 and earlier releases of the tiff package.
CVE-2016-9297 involves a denial of service attack caused by crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
No, CVE-2016-9297 is classified as a denial of service vulnerability, not a remote code execution vulnerability.