First published: Tue Aug 22 2023(Updated: )
LibTIFF is vulnerable to a denial of service, caused by a heap-based buffer overflow in _TIFFmemcpy at tif_unix.c when parsing TIFF files. By persuading a victim to open a specially crafted TIFF file, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.0.10 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap buffer overflow in libtiff is CVE-2020-18768.
The affected software is libtiff version 4.0.10.
The severity of CVE-2020-18768 is medium with a CVSS score of 5.5.
An attacker can exploit this vulnerability by crafting a malicious tiff file that triggers a heap buffer overflow in libtiff.
Yes, a fix is available. It is recommended to update to a patched version of libtiff.