First published: Thu Jan 12 2017(Updated: )
LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIFF | =4.0.7 | |
=4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5225 is classified as a high-severity vulnerability due to the potential for remote code execution.
To fix CVE-2017-5225, upgrade to LibTIFF version 4.0.8 or later where the vulnerability has been patched.
CVE-2017-5225 is caused by a heap buffer overflow in the tiffcp tool when processing a crafted BitsPerSample value.
The potential impacts of CVE-2017-5225 include denial of service (DoS) and the execution of arbitrary code.
CVE-2017-5225 affects LibTIFF version 4.0.7 specifically.