First published: Mon Aug 05 2024(Updated: )
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.2.0-1+deb11u5<=4.5.0-6+deb12u1 | 4.5.1+git230720-5 |
libtiff | >=3.5.1<=4.6.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
redhat enterprise Linux for arm 64 | =9.2 | |
redhat enterprise Linux for power little endian eus | =9.2 | |
redhat enterprise Linux server aus | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-7006 is classified as a moderate severity vulnerability due to the potential for causing memory allocation failures.
To fix CVE-2024-7006, upgrade the affected software versions to the patched releases or apply the available patches from the vendor.
CVE-2024-7006 affects various versions of Libtiff and IBM Cognos Analytics, as well as specific versions of Red Hat Enterprise Linux.
CVE-2024-7006 is a null pointer dereference vulnerability that can lead to segmentation faults and application crashes.
Yes, CVE-2024-7006 can potentially be exploited remotely if an attacker can manipulate the data processed by the affected software.