Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4775

Опубликовано: 24 мар. 2026
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

Отчет

A flaw in the libtiff library, affecting the processing of specially crafted TIFF files, could lead to a denial of service or potentially arbitrary code execution. This vulnerability, caused by a signed integer overflow during TIFF image processing, results in an out-of-bounds heap write. Red Hat products that process untrusted TIFF files using libtiff may be impacted.

Меры по смягчению последствий

To mitigate this issue, avoid processing untrusted or maliciously crafted TIFF files with applications linked against the libtiff library. If processing untrusted TIFF files is unavoidable, consider running the affected applications within a sandboxed environment to limit the potential impact of successful exploitation. This operational control helps contain the effects of an out-of-bounds write, reducing the risk of denial of service or arbitrary code execution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libtiffAffected
Red Hat Enterprise Linux 6libtiffAffected
Red Hat Enterprise Linux 7compat-libtiff3Affected
Red Hat Enterprise Linux 7libtiffAffected
Red Hat Enterprise Linux 8compat-libtiff3Affected
Red Hat Enterprise Linux 8libtiffAffected
Red Hat Enterprise Linux 8mingw-libtiffAffected
Red Hat Enterprise Linux 9libtiffAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2450768libtiff: libtiff: Arbitrary code execution or denial of service via signed integer overflow in TIFF file processing

EPSS

Процентиль: 24%
0.00081
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
15 дней назад

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

CVSS3: 7.8
nvd
15 дней назад

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

msrc
13 дней назад

Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing

CVSS3: 7.8
debian
15 дней назад

A flaw was found in the libtiff library. A remote attacker could explo ...

CVSS3: 7.8
github
15 дней назад

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

EPSS

Процентиль: 24%
0.00081
Низкий

7.8 High

CVSS3