First published: Fri Jul 12 2024(Updated: )
A flaw was found in the libtiff library. An out-of-memory issue in the TIFFReadEncodedStrip function can be triggered when processing a crafted tiff file, allowing attackers to perform memory allocation of arbitrary sizes, resulting in a denial of service. Reference: <a href="https://gitlab.com/libtiff/libtiff/-/issues/620">https://gitlab.com/libtiff/libtiff/-/issues/620</a> Upstream patch: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/553">https://gitlab.com/libtiff/libtiff/-/merge_requests/553</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6716 is categorized as a high severity vulnerability due to its potential to cause denial of service through memory allocation issues.
To fix CVE-2024-6716, update to the latest version of the libtiff library that addresses this out-of-memory vulnerability.
CVE-2024-6716 is an out-of-memory issue found in the TIFFReadEncodedStrip function of the libtiff library.
Specific versions of the libtiff library are affected by CVE-2024-6716, so it is recommended to check your current version and apply updates accordingly.
Attackers can exploit CVE-2024-6716 to trigger a denial of service condition by processing specially crafted TIFF files.