The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
References
Link | Resource |
---|---|
http://bugzilla.maptools.org/show_bug.cgi?id=2590 | Issue Tracking Patch |
http://www.debian.org/security/2017/dsa-3762 | |
http://www.openwall.com/lists/oss-security/2016/11/12/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/11/14/7 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/94419 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-16 | |
http://bugzilla.maptools.org/show_bug.cgi?id=2590 | Issue Tracking Patch |
http://www.debian.org/security/2017/dsa-3762 | |
http://www.openwall.com/lists/oss-security/2016/11/12/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/11/14/7 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/94419 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-16 |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.maptools.org/show_bug.cgi?id=2590 - Issue Tracking, Patch | |
References | () http://www.debian.org/security/2017/dsa-3762 - | |
References | () http://www.openwall.com/lists/oss-security/2016/11/12/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/11/14/7 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94419 - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201701-16 - |
Information
Published : 2017-01-18 17:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9297
Mitre link : CVE-2016-9297
CVE.ORG link : CVE-2016-9297
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-125
Out-of-bounds Read