First published: Thu Sep 09 2021(Updated: )
Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the "TIFFVGetField" funtion in the component 'libtiff/tif_dir.c'.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
simplesystems LibTiff | =4.0.10 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-19143 is classified with a medium severity due to its potential to cause a denial of service.
To fix CVE-2020-19143, upgrade to a patched version of LibTiff, such as 4.1.0+git191117-2~deb10u4 or later.
LibTiff version 4.0.10 is directly affected by CVE-2020-19143.
CVE-2020-19143 primarily leads to a denial of service rather than directly causing data loss.
Exploitation of CVE-2020-19143 may require specific conditions in the input TIFF files, making it a target for deliberate attacks.