First published: Sun Feb 12 2023(Updated: )
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted16bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtiff | <0:4.4.0-8.el9_2 | 0:4.4.0-8.el9_2 |
Libtiff Libtiff | <=4.4.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0795 is a vulnerability in LibTIFF 4.4.0 that allows attackers to cause a denial-of-service via a crafted tiff file.
CVE-2023-0795 affects LibTIFF 4.4.0, specifically the tiffcrop tool in tools/tiffcrop.c:3488.
An attacker can exploit CVE-2023-0795 by using a crafted tiff file to trigger an out-of-bounds read in the tiffcrop tool.
If you compile libtiff from sources, the fix for CVE-2023-0795 is available with commit afaabc3e.
You can find more information about CVE-2023-0795 at the following references: [link1](https://security-tracker.debian.org/tracker/CVE-2023-0795) [link2](https://security-tracker.debian.org/tracker/CVE-2023-0796) [link3](https://security-tracker.debian.org/tracker/CVE-2023-0797)