Описание
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | libtiff | Not affected | ||
Red Hat Enterprise Linux 7 | compat-libtiff3 | Not affected | ||
Red Hat Enterprise Linux 7 | libtiff | Out of support scope | ||
Red Hat Enterprise Linux 8 | compat-libtiff3 | Not affected | ||
Red Hat Enterprise Linux 8 | libtiff | Fixed | RHSA-2022:7585 | 08.11.2022 |
Red Hat Enterprise Linux 9 | libtiff | Fixed | RHSA-2022:8194 | 15.11.2022 |
Показывать по
Дополнительная информация
Статус:
5.5 Medium
CVSS3
Связанные уязвимости
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
Null source pointer passed as an argument to memcpy() function within ...
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
5.5 Medium
CVSS3