First published: Sun Feb 12 2023(Updated: )
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractContigSamplesShifted8bits function in tools/tiffcrop.c, resulting in a Denial of Service and limited information disclosure.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtiff | <0:4.4.0-8.el9_2 | 0:4.4.0-8.el9_2 |
Libtiff Libtiff | <=4.4.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0798 is a vulnerability in LibTIFF 4.4.0 that allows attackers to cause a denial-of-service by exploiting an out-of-bounds read in the tiffcrop utility.
CVE-2023-0798 has a severity level of medium (4) based on the severity value assigned by the vulnerability assessment.
An attacker can exploit CVE-2023-0798 by crafting a malicious tiff file and using it to trigger the out-of-bounds read in the tiffcrop utility, resulting in a denial-of-service.
To fix CVE-2023-0798, users that compile libtiff from sources should apply the fix with commit afaabc3e.
You can find more information about CVE-2023-0798 on the GitLab links provided: [Commit](https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68) and [Issue](https://gitlab.com/libtiff/libtiff/-/issues/492). Additionally, you can check the Debian security tracker for this vulnerability at [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2023-0798).