First published: Mon Dec 14 2020(Updated: )
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtiff | <0:4.0.9-20.el8 | 0:4.0.9-20.el8 |
Libtiff Libtiff | <4.2.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
redhat/libtiff | <4.2.0 | 4.2.0 |
debian/tiff | 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35523 is an integer overflow flaw in libtiff that allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file.
The severity of CVE-2020-35523 is high with a CVSS score of 7.8.
The software affected by CVE-2020-35523 includes versions 4.0.3-7ubuntu0.11+, 4.0.6-1ubuntu0.8, 4.0.9-5ubuntu0.4, 4.1.0+, 4.1.0+git191117-2~deb10u4, 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, 4.5.1+git230720-1, 4.2.0, and 4.0.9-20.el8.
To fix CVE-2020-35523, update the libtiff software to version 4.1.0 or higher.
More information about CVE-2020-35523 can be found at the following references: [link1](https://bugzilla.redhat.com/show_bug.cgi?id=1932040), [link2](https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2), [link3](https://gitlab.com/libtiff/libtiff/-/merge_requests/160).