First published: Tue Apr 12 2022(Updated: )
A heap-buffer-overflow flaw was found in TIFFReadRawDataStriped() function in tiffinfo.c. References: <a href="https://gitlab.com/libtiff/libtiff/-/issues/319">https://gitlab.com/libtiff/libtiff/-/issues/319</a> <a href="https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798">https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2074404 is classified as a heap-buffer-overflow vulnerability.
To fix REDHAT-BUG-2074404, update to the latest version of the LibTIFF library that addresses this heap-buffer-overflow flaw.
The vulnerability in REDHAT-BUG-2074404 is caused by a flaw in the TIFFReadRawDataStriped() function which can lead to heap-buffer overflow.
LibTIFF is the software affected by the vulnerability REDHAT-BUG-2074404.
As of now, there are no publicly known exploits for the vulnerability REDHAT-BUG-2074404.