First published: Fri Jun 30 2023(Updated: )
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. <a href="https://gitlab.com/libtiff/libtiff/-/issues/520">https://gitlab.com/libtiff/libtiff/-/issues/520</a> <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/467">https://gitlab.com/libtiff/libtiff/-/merge_requests/467</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2218744 is classified as high due to the potential for heap buffer overflow leading to application crashes.
To fix REDHAT-BUG-2218744, upgrade to the latest version of libtiff where the vulnerability has been patched.
The affected software for REDHAT-BUG-2218744 is libtiff version 4.5.0.
The nature of the vulnerability in REDHAT-BUG-2218744 is a buffer overflow caused by incorrect buffer size updates after the rotateImage() function.
While REDHAT-BUG-2218744 primarily leads to application crashes, it can create opportunities for exploitation that may lead to data breaches if combined with other vulnerabilities.