Описание
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
Отчет
The flaw allows an attacker to potentially cause a denial of service attack by crashing a program, but the impact is minimal.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | libtiff | Out of support scope | ||
Red Hat Enterprise Linux 7 | compat-libtiff3 | Out of support scope | ||
Red Hat Enterprise Linux 7 | libtiff | Out of support scope | ||
Red Hat Enterprise Linux 8 | compat-libtiff3 | Will not fix | ||
Red Hat Enterprise Linux 9 | libtiff | Affected | ||
Red Hat Enterprise Linux 8 | libtiff | Fixed | RHSA-2024:5079 | 07.08.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
A segment fault (SEGV) flaw was found in libtiff that could be trigger ...
EPSS
7.5 High
CVSS3