First published: Mon Feb 13 2023(Updated: )
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | <=4.4.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0802 is a vulnerability in LibTIFF 4.4.0 that allows attackers to cause a denial-of-service via a crafted TIFF file.
CVE-2023-0802 has a severity score of 5.5, which is considered medium severity.
LibTIFF versions up to and including 4.4.0, as well as certain versions of the Debian package 'tiff', are affected by CVE-2023-0802.
If you compile libtiff from sources, you can fix CVE-2023-0802 by applying commit 33aee127. For Debian users, updated versions of the 'tiff' package are available. Please refer to the references for more details.
You can find more information about CVE-2023-0802 in the provided references.