First published: Mon Jun 19 2023(Updated: )
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | >=3.9.0<4.5.1 | |
debian/tiff | <=4.2.0-1+deb11u5 | 4.5.0-6+deb12u1 4.5.1+git230720-5 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3316 is a vulnerability that leads to a NULL pointer dereference in TIFFClose() due to a failure to open an output file.
The severity of CVE-2023-3316 is 6.5 (medium).
CVE-2023-3316 affects Libtiff versions between 3.9.0 and 4.5.1.
CVE-2023-3316 affects Debian with the affected package being 'tiff' and the versions affected are 4.1.0+git191117-2~deb10u4, 4.2.0-1+deb11u4, and 4.5.0-6.
Yes, the remedy for CVE-2023-3316 is to update the 'tiff' package to version 4.1.0+git191117-2~deb10u8 or 4.5.1+git230720-1 for Debian.