First published: Tue Mar 15 2022(Updated: )
A heap buffer overflow in libtiff library Version 4.3.0 may allow an attacker to trigger an unsafe memory access. Using a crafted TIFF image file could result into application crash, potential information disclosure or any other context-dependent impact. Upstream fix: <a href="https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c">https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2064411 is considered to be critical due to the potential for application crashes and information disclosure.
To fix REDHAT-BUG-2064411, update to a patched version of the libtiff library as specified by the official release notes.
REDHAT-BUG-2064411 is classified as a heap buffer overflow vulnerability.
An attacker could exploit REDHAT-BUG-2064411 to perform unsafe memory access, potentially leading to application crashes or information leakage.
The affected software for REDHAT-BUG-2064411 is the libtiff library, specifically version 4.3.0.