Описание
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | libtiff | Not affected | ||
Red Hat Enterprise Linux 7 | compat-libtiff3 | Not affected | ||
Red Hat Enterprise Linux 7 | libtiff | Out of support scope | ||
Red Hat Enterprise Linux 8 | compat-libtiff3 | Not affected | ||
Red Hat Enterprise Linux 8 | mingw-libtiff | Will not fix | ||
Red Hat Enterprise Linux 9 | compat-libtiff3 | Not affected | ||
Red Hat Enterprise Linux 8 | libtiff | Fixed | RHSA-2022:7585 | 08.11.2022 |
Red Hat Enterprise Linux 9 | libtiff | Fixed | RHSA-2022:8194 | 15.11.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.5 Medium
CVSS3
Связанные уязвимости
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c i ...
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
EPSS
5.5 Medium
CVSS3