libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2118847 | patch third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5333 | third party advisory vendor advisory |