First published: Tue May 16 2023(Updated: )
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | <4.5.0 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =9.0 | |
redhat/libtiff | <4.5.0 | 4.5.0 |
debian/tiff | 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-5 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2731 is a vulnerability in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file that can be exploited by a local attacker to crash or disrupt the program.
CVE-2023-2731 can cause an affected software to crash or become unresponsive when processing a TIFF format file.
The affected software versions include tiff 4.5.0-5ubuntu1.1, tiff 4.5.0-6 and 4.5.1, and libtiff 4.1.0+git191117-2~deb10u4, 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0, and 4.5.1+git230720-1.
To mitigate CVE-2023-2731, users should update their Libtiff software to version 4.5.0-5ubuntu1.1 or apply the recommended patches provided by the software vendor.
More information about CVE-2023-2731 can be found on the Red Hat Security Advisory, Bugzilla, and GitHub pages linked in the references.