[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-364 --- libtiff

ID: oval:org.secpod.oval:def:19500423Date: (C)2024-01-04   (M)2024-01-23
Class: PATCHFamily: unix




LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b. processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow via a crafted TIFF image. A vulnerability was found in libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c Multiple potential integer overflow in tiffcp.c in libtiff less than = 4.5.1 can allow remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image which triggers a heap-based buffer overflow. Multiple potential integer overflow in raw2tiff.c in libtiff less than = 4.5.1 can allow remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image which triggers a heap-based buffer overflow

Platform:
Amazon Linux 2023
Product:
libtiff
Reference:
ALAS2023-2023-364
CVE-2022-3598
CVE-2022-48281
CVE-2023-30775
CVE-2023-40745
CVE-2023-41175
CVE    5
CVE-2023-41175
CVE-2023-40745
CVE-2022-3598
CVE-2022-48281
...
CPE    1
cpe:/a:libtiff:libtiff

© SecPod Technologies