First published: Fri Jan 27 2017(Updated: )
The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | =4.0.6 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9448 has a severity rating that indicates it can lead to denial of service due to a null pointer dereference.
To fix CVE-2016-9448, you should upgrade to a fixed version of the LibTiff library, specifically versions higher than 4.0.6.
CVE-2016-9448 affects LibTiff version 4.0.6 and certain versions of the 'tiff' package in Debian and openSUSE.
Yes, CVE-2016-9448 can be exploited by remote attackers to cause a denial of service.
The potential impact of CVE-2016-9448 is a crash of the application utilizing LibTiff, leading to a denial of service.