Buffer Overflow vulnerability found in tinyTIFF v.3.0 allows a local attacker to cause a denial of service via the TinyTiffReader_readNextFrame function in tinytiffreader.c file.
References
Link | Resource |
---|---|
https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md | Exploit Third Party Advisory |
https://github.com/jkriege2/TinyTIFF/issues/19 | Exploit Issue Tracking Vendor Advisory |
https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md | Exploit Third Party Advisory |
https://github.com/jkriege2/TinyTIFF/issues/19 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 07:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md - Exploit, Third Party Advisory | |
References | () https://github.com/jkriege2/TinyTIFF/issues/19 - Exploit, Issue Tracking, Vendor Advisory |
Information
Published : 2023-04-04 15:15
Updated : 2024-11-21 07:51
NVD link : CVE-2023-26733
Mitre link : CVE-2023-26733
CVE.ORG link : CVE-2023-26733
JSON object : View
Products Affected
tinytiff_project
- tinytiff
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')