First published: Fri Nov 24 2023(Updated: )
An out-of-memory problem was found in libtiff that could be triggered by passing a craft tiff file to TIFFOpen() API. In this flaw a remote attackers could cause deny-of-services via a craft input (with size smaller than 379 KB). Reference: <a href="https://gitlab.com/libtiff/libtiff/-/issues/614">https://gitlab.com/libtiff/libtiff/-/issues/614</a> Fixed at: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/545">https://gitlab.com/libtiff/libtiff/-/merge_requests/545</a> <a href="https://gitlab.com/libtiff/libtiff/-/commit/d6bbe53a96b031ab8b53d20241825ddf9e8bf8f1">https://gitlab.com/libtiff/libtiff/-/commit/d6bbe53a96b031ab8b53d20241825ddf9e8bf8f1</a> <a href="https://gitlab.com/libtiff/libtiff/-/commit/264a28eff71cf0038ba7b235238512fa594fa42f">https://gitlab.com/libtiff/libtiff/-/commit/264a28eff71cf0038ba7b235238512fa594fa42f</a> <a href="https://gitlab.com/libtiff/libtiff/-/commit/abb4476fd2be87fc8ded3078e019f22f84ee0e8c">https://gitlab.com/libtiff/libtiff/-/commit/abb4476fd2be87fc8ded3078e019f22f84ee0e8c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2251311 is classified as a denial-of-service vulnerability.
To fix REDHAT-BUG-2251311, update libtiff to the latest version that addresses this vulnerability.
Any remote attacker can exploit REDHAT-BUG-2251311 by providing a crafted TIFF file to the TIFFOpen() API.
The potential impacts of REDHAT-BUG-2251311 include service disruption due to the out-of-memory issue.
The affected software under REDHAT-BUG-2251311 is libtiff.