First published: Mon Feb 13 2023(Updated: )
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com CVE-2023-3618 CVE-2023-3618 CVE-2023-3618
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Libtiff Libtiff | <4.5.1 | |
Debian Debian Linux | =10.0 | |
Apple macOS Ventura | <13.6.3 | 13.6.3 |
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS Sonoma | <14.2 | 14.2 |
redhat/libtiff | <4.5.1 | 4.5.1 |
debian/tiff | <=4.2.0-1+deb11u5<=4.5.0-6+deb12u1 | 4.5.1+git230720-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-3618 is a vulnerability found in libtiff that can lead to a denial of service due to a buffer overflow in the Fax3Encode function.
CVE-2023-3618 has a severity rating of 6.5 (high).
CVE-2023-3618 affects Redhat Enterprise Linux 8.0.
To fix CVE-2023-3618 on Ubuntu, update the 'tiff' package to version 4.1.0+ or higher.
The Common Weakness Enumeration (CWE) ID for CVE-2023-3618 is 119, 120.