First published: Fri Nov 24 2023(Updated: )
A Segment fault (SEGV) problem was found in libtiff that could be triggered by passing a craft tiff file to TIFFReadRGBATileExt() API. In this flaw a remote attackers could cause a Heap-buffer-overflow problem leading to a denial of service. Reference: <a href="https://gitlab.com/libtiff/libtiff/-/issues/622">https://gitlab.com/libtiff/libtiff/-/issues/622</a> Fixed at: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/546">https://gitlab.com/libtiff/libtiff/-/merge_requests/546</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2251344 is high due to the potential for a heap-buffer-overflow leading to denial of service.
Fixing REDHAT-BUG-2251344 involves updating to the latest version of the LibTIFF library that addresses this specific security flaw.
The impact of REDHAT-BUG-2251344 includes the possibility of remote attackers causing a crash or denial of service on systems using affected versions of libtiff.
Users and applications utilizing the libtiff library for image processing, particularly those handling TIFF files, are affected by REDHAT-BUG-2251344.
A workaround for REDHAT-BUG-2251344 may involve restricting access to the TIFF files or implementing additional monitoring to prevent exploitation until a patch can be applied.