First published: Mon Aug 05 2024(Updated: )
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.2.0-1+deb11u5<=4.5.0-6+deb12u1 | 4.5.1+git230720-5 |
TIFF | >=3.5.1<=4.6.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux | =9.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.2 | |
Red Hat Enterprise Linux Server | =9.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-7006 is classified as a moderate severity vulnerability due to the potential for causing memory allocation failures.
To fix CVE-2024-7006, upgrade the affected software versions to the patched releases or apply the available patches from the vendor.
CVE-2024-7006 affects various versions of Libtiff and IBM Cognos Analytics, as well as specific versions of Red Hat Enterprise Linux.
CVE-2024-7006 is a null pointer dereference vulnerability that can lead to segmentation faults and application crashes.
Yes, CVE-2024-7006 can potentially be exploited remotely if an attacker can manipulate the data processed by the affected software.