A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:2289 | |
https://access.redhat.com/security/cve/CVE-2023-41175 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2235264 | Issue Tracking Third Party Advisory |
Configurations
History
30 Apr 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Oct 2023, 14:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-190 | |
CPE | cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
First Time |
Libtiff
Redhat Fedoraproject Fedoraproject fedora Redhat enterprise Linux Libtiff libtiff |
|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2235264 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-41175 - Third Party Advisory |
05 Oct 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-05 19:15
Updated : 2024-04-30 15:15
NVD link : CVE-2023-41175
Mitre link : CVE-2023-41175
CVE.ORG link : CVE-2023-41175
JSON object : View
Products Affected
libtiff
- libtiff
redhat
- enterprise_linux
fedoraproject
- fedora