First published: Fri Jun 30 2023(Updated: )
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian. <a href="https://gitlab.com/libtiff/libtiff/-/issues/530">https://gitlab.com/libtiff/libtiff/-/issues/530</a> <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/473">https://gitlab.com/libtiff/libtiff/-/merge_requests/473</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2218749 is classified as critical due to the potential for a buffer overflow.
To fix REDHAT-BUG-2218749, update to the latest version of libtiff that addresses this vulnerability.
The affected product for REDHAT-BUG-2218749 is libtiff version 4.5.0.
REDHAT-BUG-2218749 is a buffer overflow vulnerability related to the uv_encode() function.
Yes, REDHAT-BUG-2218749 can potentially be exploited remotely through the processing of a maliciously crafted TIFF file.