CVE-2023-52356

A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:39

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/16 -
  • () http://seclists.org/fulldisclosure/2024/Jul/17 -
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/19 -
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -
  • () http://seclists.org/fulldisclosure/2024/Jul/21 -
  • () http://seclists.org/fulldisclosure/2024/Jul/22 -
  • () http://seclists.org/fulldisclosure/2024/Jul/23 -
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html -
  • () https://support.apple.com/kb/HT214116 -
  • () https://support.apple.com/kb/HT214117 -
  • () https://support.apple.com/kb/HT214118 -
  • () https://support.apple.com/kb/HT214119 -
  • () https://support.apple.com/kb/HT214120 -
  • () https://support.apple.com/kb/HT214122 -
  • () https://support.apple.com/kb/HT214123 -
  • () https://support.apple.com/kb/HT214124 -
References () https://access.redhat.com/security/cve/CVE-2023-52356 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-52356 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2251344 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2251344 - Issue Tracking, Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/issues/622 - Issue Tracking, Patch () https://gitlab.com/libtiff/libtiff/-/issues/622 - Issue Tracking, Patch
References () https://gitlab.com/libtiff/libtiff/-/merge_requests/546 - Issue Tracking, Patch () https://gitlab.com/libtiff/libtiff/-/merge_requests/546 - Issue Tracking, Patch

16 Sep 2024, 20:15

Type Values Removed Values Added
References
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/16', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/17', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/18', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/19', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/20', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/21', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/22', 'source': 'secalert@redhat.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2024/Jul/23', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214116', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214117', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214118', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214119', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214120', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214122', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214123', 'source': 'secalert@redhat.com'}
  • {'url': 'https://support.apple.com/kb/HT214124', 'source': 'secalert@redhat.com'}

07 Aug 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:5079 -

30 Jul 2024, 02:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/19 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/16 -
  • () http://seclists.org/fulldisclosure/2024/Jul/17 -
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -
  • () http://seclists.org/fulldisclosure/2024/Jul/21 -
  • () http://seclists.org/fulldisclosure/2024/Jul/22 -
  • () http://seclists.org/fulldisclosure/2024/Jul/23 -

29 Jul 2024, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214116 -
  • () https://support.apple.com/kb/HT214117 -
  • () https://support.apple.com/kb/HT214118 -
  • () https://support.apple.com/kb/HT214119 -
  • () https://support.apple.com/kb/HT214120 -
  • () https://support.apple.com/kb/HT214122 -
  • () https://support.apple.com/kb/HT214123 -
  • () https://support.apple.com/kb/HT214124 -

11 Mar 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html -

31 Jan 2024, 17:41

Type Values Removed Values Added
First Time Redhat
Redhat enterprise Linux
Libtiff
Libtiff libtiff
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-787
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
References () https://gitlab.com/libtiff/libtiff/-/merge_requests/546 - () https://gitlab.com/libtiff/libtiff/-/merge_requests/546 - Issue Tracking, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2251344 - () https://bugzilla.redhat.com/show_bug.cgi?id=2251344 - Issue Tracking, Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/issues/622 - () https://gitlab.com/libtiff/libtiff/-/issues/622 - Issue Tracking, Patch
References () https://access.redhat.com/security/cve/CVE-2023-52356 - () https://access.redhat.com/security/cve/CVE-2023-52356 - Third Party Advisory

25 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 20:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52356

Mitre link : CVE-2023-52356

CVE.ORG link : CVE-2023-52356


JSON object : View

Products Affected

libtiff

  • libtiff

redhat

  • enterprise_linux
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write