First published: Tue Nov 22 2016(Updated: )
tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
libtiff | =4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9537 is considered high due to the potential for out-of-bounds write vulnerabilities leading to memory corruption.
To fix CVE-2016-9537, upgrade to tiff versions 4.1.0+git191117-2~deb10u4 or later, or apply available patches.
CVE-2016-9537 affects libtiff version 4.0.6 and potentially earlier versions.
Yes, CVE-2016-9537 could potentially be exploited remotely if an attacker can manipulate input to the vulnerable software.
The potential impacts of CVE-2016-9537 include application crashes, data corruption, and unauthorized access to system memory.