First published: Fri Jan 27 2017(Updated: )
The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
tiff | <4.0.7 | |
SUSE Linux | =13.2 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9453 is classified as a high severity vulnerability due to its potential to cause denial of service and possible arbitrary code execution.
To fix CVE-2016-9453, update to the patched versions of the tiff package or libtiff as specified by your system's package manager.
CVE-2016-9453 affects versions of libtiff prior to 4.0.7.
CVE-2016-9453 can be exploited for remote denial of service attacks or potentially executing arbitrary code via malformed JPEG files.
CVE-2016-9453 impacts the tiff package on operating systems such as Debian and openSUSE.