The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
References
Link | Resource |
---|---|
http://bugzilla.maptools.org/show_bug.cgi?id=2569 | Issue Tracking |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html | Exploit Third Party Advisory |
http://www.debian.org/security/2017/dsa-3762 | |
http://www.openwall.com/lists/oss-security/2016/04/08/3 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/85952 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-16 | |
http://bugzilla.maptools.org/show_bug.cgi?id=2569 | Issue Tracking |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html | Exploit Third Party Advisory |
http://www.debian.org/security/2017/dsa-3762 | |
http://www.openwall.com/lists/oss-security/2016/04/08/3 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/85952 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-16 |
Configurations
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.maptools.org/show_bug.cgi?id=2569 - Issue Tracking | |
References | () http://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html - Exploit, Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3762 - | |
References | () http://www.openwall.com/lists/oss-security/2016/04/08/3 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/85952 - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201701-16 - |
Information
Published : 2016-10-03 16:09
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3623
Mitre link : CVE-2016-3623
CVE.ORG link : CVE-2016-3623
JSON object : View
Products Affected
opensuse
- opensuse
libtiff
- libtiff
CWE
CWE-369
Divide By Zero