First published: Fri Mar 23 2018(Updated: )
LibTIFF since version 3.9.0 is vulnerable to a heap-based buffer overflow in the tif_lzw.c:LZWDecodeCompat() function. An attacker could exploit this to cause a denial of service via crafted TIF file. Upstream Issue: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2780">http://bugzilla.maptools.org/show_bug.cgi?id=2780</a> Additional References: <a href="https://github.com/halfbitteam/POCs/tree/master/libtiff-4.08_tiff2ps_heap_overflow">https://github.com/halfbitteam/POCs/tree/master/libtiff-4.08_tiff2ps_heap_overflow</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | >=3.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1559704 is significant due to the potential for remote denial of service attacks via crafted TIF files.
To fix REDHAT-BUG-1559704, you should update to a patched version of LibTIFF that addresses the heap-based buffer overflow vulnerability.
LibTIFF versions 3.9.0 and later are affected by REDHAT-BUG-1559704.
REDHAT-BUG-1559704 is a heap-based buffer overflow vulnerability located in the tif_lzw.c:LZWDecodeCompat() function.
Yes, REDHAT-BUG-1559704 can potentially be exploited remotely through specially crafted TIF files.