tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
References
Link | Resource |
---|---|
https://github.com/vadz/libtiff/commit/5397a417e61258c69209904e652a1f409ec3b9df | Issue Tracking Patch Third Party Advisory |
https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ | Patch Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/97202 | |
https://security.gentoo.org/glsa/201709-27 | |
https://usn.ubuntu.com/3602-1/ |
Configurations
Information
Published : 2017-03-24 12:59
Updated : 2018-03-21 18:29
NVD link : CVE-2016-10268
Mitre link : CVE-2016-10268
JSON object : View
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
Products Affected
libtiff
- libtiff