First published: Fri May 11 2018(Updated: )
A flaw was found in LibTIFF 3.8.2 in TIFFWriteScanline function in tif_write.c. A heap-based buffer over-read, as demonstrated by bmp2tiff. References: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2788">http://bugzilla.maptools.org/show_bug.cgi?id=2788</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | =3.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1577311 is categorized as a high impact vulnerability due to the potential for heap-based buffer over-read.
To fix REDHAT-BUG-1577311, update LibTIFF to a patched version that addresses the vulnerability.
REDHAT-BUG-1577311 affects LibTIFF version 3.8.2.
The flaw in REDHAT-BUG-1577311 is a heap-based buffer over-read in the TIFFWriteScanline function of LibTIFF.
Yes, REDHAT-BUG-1577311 can potentially be exploited remotely if an attacker can manipulate the input processed by LibTIFF.