A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22 | third party advisory patch |
https://gitlab.com/libtiff/libtiff/-/merge_requests/159 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1932044 | issue tracking third party advisory patch |
https://www.debian.org/security/2021/dsa-4869 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ | vendor advisory |
https://security.gentoo.org/glsa/202104-06 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20210521-0009/ | third party advisory |