An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
References
Link | Resource |
---|---|
http://www.talosintelligence.com/reports/TALOS-2016-0187/ | Exploit Technical Description Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/93902 | |
https://security.gentoo.org/glsa/201701-16 | |
http://www.debian.org/security/2017/dsa-3762 | |
http://rhn.redhat.com/errata/RHSA-2017-0225.html |
Configurations
Information
Published : 2017-01-06 13:59
Updated : 2018-01-04 18:31
NVD link : CVE-2016-5652
Mitre link : CVE-2016-5652
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
libtiff
- libtiff